On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Issues and challenges of load balancing techniques in cloud computing: A survey
With the growth in computing technologies, cloud computing has added a new paradigm to
user services that allows accessing Information Technology services on the basis of pay-per …
user services that allows accessing Information Technology services on the basis of pay-per …
Everything as a service (XaaS) on the cloud: origins, current and future trends
For several years now, scientists have been proposing numerous models for defining
anything" as a service (aaS)", including discussions of products, processes, data & …
anything" as a service (aaS)", including discussions of products, processes, data & …
Executing SQL over encrypted data in the database-service-provider model
Rapid advances in networking and Internet technologies have fueled the emergence of the"
software as a service" model for enterprise computing. Successful examples of commercially …
software as a service" model for enterprise computing. Successful examples of commercially …
Secure kNN computation on encrypted databases
WK Wong, DW Cheung, B Kao… - Proceedings of the 2009 …, 2009 - dl.acm.org
Service providers like Google and Amazon are moving into the SaaS (Software as a
Service) business. They turn their huge infrastructure into a cloud-computing environment …
Service) business. They turn their huge infrastructure into a cloud-computing environment …
Blindfl: Vertical federated machine learning without peeking into your data
Due to the rising concerns on privacy protection, how to build machine learning (ML) models
over different data sources with security guarantees is gaining more popularity. Vertical …
over different data sources with security guarantees is gaining more popularity. Vertical …
Analytics over large-scale multidimensional data: the big data revolution!
In this paper, we provide an overview of state-of-the-art research issues and achievements
in the field of analytics over big data, and we extend the discussion to analytics over big …
in the field of analytics over big data, and we extend the discussion to analytics over big …
Hippocratic databases
Publisher Summary The Hippocratic Oath has guided the conduct of physicians for
centuries. Inspired by its tenet of preserving privacy, it has been argued that future database …
centuries. Inspired by its tenet of preserving privacy, it has been argued that future database …
Searchable encryption with secure and efficient updates
Searchable (symmetric) encryption allows encryption while still enabling search for
keywords. Its immediate application is cloud storage where a client outsources its files while …
keywords. Its immediate application is cloud storage where a client outsources its files while …
Dynamic authenticated index structures for outsourced databases
In outsourced database (ODB) systems the database owner publishes its data through a
number of remote servers, with the goal of enabling clients at the edge of the network to …
number of remote servers, with the goal of enabling clients at the edge of the network to …