Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data

Z **a, X Wang, X Sun, Q Wang - IEEE transactions on parallel …, 2015 - ieeexplore.ieee.org
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …

Enabling personalized search over encrypted outsourced data with efficiency improvement

Z Fu, K Ren, J Shu, X Sun… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
In cloud computing, searchable encryption scheme over outsourced data is a hot research
field. However, most existing works on encrypted search over outsourced cloud data follow …

A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing

Z **a, X Wang, L Zhang, Z Qin, X Sun… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …

Enabling secure and efficient ranked keyword search over outsourced cloud data

C Wang, N Cao, K Ren, W Lou - IEEE Transactions on parallel …, 2011 - ieeexplore.ieee.org
Cloud computing economically enables the paradigm of data service outsourcing. However,
to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the …

Enabling efficient and geometric range query with access control over encrypted spatial data

G Xu, H Li, Y Dai, K Yang, X Lin - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …

Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data

H Li, Y Yang, Y Dai, S Yu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In medical cloud computing, a patient can remotely outsource her medical data to the cloud
server. In this case, only authorized doctors are allowed to access the data since the medical …

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing

Z **a, NN **ong, AV Vasilakos, X Sun - Information Sciences, 2017 - Elsevier
The content-based image retrieval (CBIR) has been widely studied along with the increasing
importance of images in our daily life. Compared with the text documents, images consume …

Towards privacy-preserving content-based image retrieval in cloud computing

Z **a, Y Zhu, X Sun, Z Qin, K Ren - IEEE Transactions on Cloud …, 2015 - ieeexplore.ieee.org
Content-based image retrieval (CBIR) applications have been rapidly developed along with
the increase in the quantity, availability and importance of images in our daily life. However …