Elastic Data Warehousing: Adapting To Fluctuating Workloads With Cloud-Native Technologies

S Ahmadi - Journal of Knowledge Learning and Science …, 2023 - jklst.org
This research focuses on the development of elastic data warehousing while adapting to
changing workloads with the help of cloud-based technologies. The traditional methods of …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

A Critical Investigation and Analysis of Strategic Techniques Before Approving Cloud Computing Service Frameworks

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Cloud computing is becoming increasingly fashionable in distributed computing
environment. Processing and Data storage use cloud environment is becoming a movement …

A secure blockchain-assisted access control scheme for smart healthcare system in fog computing

J Li, D Li, X Zhang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
IoT-based smart healthcare system (SHS) allows doctors to monitor and diagnose patients
remotely, which can greatly ease overcrowding in the hospitals and disequilibrium of …

Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health

H Wang, J Liang, Y Ding, S Tang, Y Wang - Computer Standards & …, 2023 - Elsevier
Smart Health, with its flexibility and efficiency, has been widely deployed, especially during
the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not …

ReLAC: Revocable and lightweight access control with blockchain for smart consumer electronics

J Zong, C Wang, J Shen, C Su… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The increasing popularity of consumer smart devices has led to concerns about the security
of electronic data. Blockchains, which are tamper-proof, can be used to store electronic data …

Server-aided bilateral access control for secure data sharing with dynamic user groups

S Xu, J Ning, X Huang, J Zhou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As a versatile technique, cloud-fog computing extends the traditional cloud server to offer
various on-demand data services. Maintaining data confidentiality is one of the most crucial …

Toward secure and privacy-preserving cloud data sharing: Online/offline multiauthority CP-ABE with hidden policy

C Zhao, L Xu, J Li, H Fang, Y Zhang - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
The continuous development of cloud storage service technology, secure access control,
and privacy issues have attracted more and more attention. The previous ciphertext policy …

Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities

A Kumar, SB Khan, SK Pandey, A Shankar… - Journal of Cloud …, 2023 - Springer
Cloud computing is the most recent smart city advancement, made possible by the
increasing volume of heterogeneous data produced by apps. More storage capacity and …

Accountable outsourcing data storage atop blockchain

M **e, Y Yu, R Chen, H Li, J Wei, Q Sun - Computer Standards & Interfaces, 2022 - Elsevier
Outsourcing data integrity auditing enables users to efficiently check whether their cloud
data are stored intactly without retrieving them. However, a problem arises that how to hold …