Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data

X Gao, J Yu, Y Chang, H Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The public cloud data integrity auditing technique is used to check the integrity of cloud data
through the Third Party Auditor (TPA). In order to make it more practical, we propose a new …

SHAMC: A Secure and highly available database system in multi-cloud environment

L Wang, Z Yang, X Song - Future Generation Computer Systems, 2020 - Elsevier
Data owners outsource their databases into the cloud to enjoy the quality services provided
by the cloud service providers. However, using cloud database makes the private data …

A survey of homomorphic encryption for outsourced big data computation

TS Fun, A Samsudin - KSII Transactions on Internet and Information …, 2016 - koreascience.kr
With traditional data storage solutions becoming too expensive and cumbersome to support
Big Data processing, enterprises are now starting to outsource their data requirements to …

Multi-cloud applications: data and code fragmentation for improved security

R Lovrenčić, D Škvorc - International Journal of Information Security, 2023 - Springer
When deciding against outsourcing their data to the cloud, organizations often point to
security as the primary reason. If cloud is not used as a passive storage only, but rather both …

A benchmark database and baseline evaluation for fall detection based on wearable sensors for the Internet of medical things platform

Z Liu, Y Cao, L Cui, J Song, G Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
Falling is a common and dangerous event for the elderly population. Fall detection is an
interesting scientific problem and an ill-defined process that can be solved through various …

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources
as a service over the Internet. The major motivation behind the cloud setup is economic …

Obscure: Information-theoretic oblivious and verifiable aggregation queries

P Gupta, Y Li, S Mehrotra, N Panwar… - Proceedings of the …, 2019 - dl.acm.org
Despite extensive research on cryptography, secure and efficient query processing over
outsourced data remains an open challenge. We develop communication-efficient and …

A practical framework for privacy-preserving nosql databases

R Macedo, J Paulo, R Pontes, B Portela… - 2017 IEEE 36th …, 2017 - ieeexplore.ieee.org
Cloud infrastructures provide database services as cost-efficient and scalable solutions for
storing and processing large amounts of data. To maximize performance, these services …

Improved TOPSIS: A multi-criteria decision making for research productivity in cloud security

D Garg, J Sidhu, S Rani - Computer Standards & Interfaces, 2019 - Elsevier
Cloud Computing (CC) paradigm has become a mainstream solution for deployment of
business processes and applications. It provides an ability to utilize geographically …

Privacy-preserving secret shared computations using mapreduce

S Dolev, P Gupta, Y Li, S Mehrotra… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Data outsourcing allows data owners to keep their data at untrusted clouds that do not
ensure the privacy of data and/or computations. One useful framework for fault-tolerant data …