Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data
The public cloud data integrity auditing technique is used to check the integrity of cloud data
through the Third Party Auditor (TPA). In order to make it more practical, we propose a new …
through the Third Party Auditor (TPA). In order to make it more practical, we propose a new …
SHAMC: A Secure and highly available database system in multi-cloud environment
L Wang, Z Yang, X Song - Future Generation Computer Systems, 2020 - Elsevier
Data owners outsource their databases into the cloud to enjoy the quality services provided
by the cloud service providers. However, using cloud database makes the private data …
by the cloud service providers. However, using cloud database makes the private data …
A survey of homomorphic encryption for outsourced big data computation
With traditional data storage solutions becoming too expensive and cumbersome to support
Big Data processing, enterprises are now starting to outsource their data requirements to …
Big Data processing, enterprises are now starting to outsource their data requirements to …
Multi-cloud applications: data and code fragmentation for improved security
R Lovrenčić, D Škvorc - International Journal of Information Security, 2023 - Springer
When deciding against outsourcing their data to the cloud, organizations often point to
security as the primary reason. If cloud is not used as a passive storage only, but rather both …
security as the primary reason. If cloud is not used as a passive storage only, but rather both …
A benchmark database and baseline evaluation for fall detection based on wearable sensors for the Internet of medical things platform
Falling is a common and dangerous event for the elderly population. Fall detection is an
interesting scientific problem and an ill-defined process that can be solved through various …
interesting scientific problem and an ill-defined process that can be solved through various …
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources
as a service over the Internet. The major motivation behind the cloud setup is economic …
as a service over the Internet. The major motivation behind the cloud setup is economic …
Obscure: Information-theoretic oblivious and verifiable aggregation queries
Despite extensive research on cryptography, secure and efficient query processing over
outsourced data remains an open challenge. We develop communication-efficient and …
outsourced data remains an open challenge. We develop communication-efficient and …
A practical framework for privacy-preserving nosql databases
Cloud infrastructures provide database services as cost-efficient and scalable solutions for
storing and processing large amounts of data. To maximize performance, these services …
storing and processing large amounts of data. To maximize performance, these services …
Improved TOPSIS: A multi-criteria decision making for research productivity in cloud security
Cloud Computing (CC) paradigm has become a mainstream solution for deployment of
business processes and applications. It provides an ability to utilize geographically …
business processes and applications. It provides an ability to utilize geographically …
Privacy-preserving secret shared computations using mapreduce
Data outsourcing allows data owners to keep their data at untrusted clouds that do not
ensure the privacy of data and/or computations. One useful framework for fault-tolerant data …
ensure the privacy of data and/or computations. One useful framework for fault-tolerant data …