Machine learning for cloud security: a systematic review
The popularity and usage of Cloud computing is increasing rapidly. Several companies are
investing in this field either for their own use or to provide it as a service for others. One of …
investing in this field either for their own use or to provide it as a service for others. One of …
[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …
active security techniques instead of traditional ones to secure the cloud environment based …
A practical privacy-preserving data aggregation (3PDA) scheme for smart grid
The real-time electricity consumption data can be used in value-added service such as big
data analysis, meanwhile the single user's privacy needs to be protected. How to balance …
data analysis, meanwhile the single user's privacy needs to be protected. How to balance …
A cloud-aided privacy-preserving multi-dimensional data comparison protocol
With the emergence of mobile social networks, users can make friends or negotiate projects
at any time and anywhere in social communities through their mobile devices (such as …
at any time and anywhere in social communities through their mobile devices (such as …
Similarity search for encrypted images in secure cloud computing
With the emergence of intelligent terminals, the Content-Based Image Retrieval (CBIR)
technique has attracted much attention from many areas (ie, cloud computing, social …
technique has attracted much attention from many areas (ie, cloud computing, social …
A semantic-based methodology for digital forensics analysis
Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or
military investigation and represent a fundamental tool to support cyber-security …
military investigation and represent a fundamental tool to support cyber-security …
Secure -NN Query on Encrypted Cloud Data with Multiple Keys
The k-nearest neighbors (k-NN) query is a fundamental primitive in spatial and multimedia
databases. It has extensive applications in location-based services, classification & …
databases. It has extensive applications in location-based services, classification & …
Privacy preserving security using biometrics in cloud computing
Cloud computing and the efficient storage provide new paradigms and approaches
designed at efficiently utilization of resources through computation and many alternatives to …
designed at efficiently utilization of resources through computation and many alternatives to …
Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation
Nowadays, cloud computing has provided enterprises and users with several capabilities to
process and store their data in various cloud data centers. Storing and processing these …
process and store their data in various cloud data centers. Storing and processing these …
Accurate range query with privacy preservation for outsourced location-based service in IOT
With the maturity of Internet-of-Things technology, location-based service (LBS) is
develo** rapidly in intelligent terminal devices, and it brings new vitality to the fields of …
develo** rapidly in intelligent terminal devices, and it brings new vitality to the fields of …