Security and privacy in cloud computing: technical review
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …
to the popularity and success of cloud computing. Cloud computing offers advantages and …
Ensuring security and privacy preservation for cloud data services
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …
starting to outsource local data to the cloud servers. However, under open networks and not …
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
Enabling personalized search over encrypted outsourced data with efficiency improvement
In cloud computing, searchable encryption scheme over outsourced data is a hot research
field. However, most existing works on encrypted search over outsourced cloud data follow …
field. However, most existing works on encrypted search over outsourced cloud data follow …
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
Enabling secure and efficient ranked keyword search over outsourced cloud data
Cloud computing economically enables the paradigm of data service outsourcing. However,
to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the …
to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the …
Enabling efficient and geometric range query with access control over encrypted spatial data
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data
In medical cloud computing, a patient can remotely outsource her medical data to the cloud
server. In this case, only authorized doctors are allowed to access the data since the medical …
server. In this case, only authorized doctors are allowed to access the data since the medical …
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
The content-based image retrieval (CBIR) has been widely studied along with the increasing
importance of images in our daily life. Compared with the text documents, images consume …
importance of images in our daily life. Compared with the text documents, images consume …
Towards privacy-preserving content-based image retrieval in cloud computing
Content-based image retrieval (CBIR) applications have been rapidly developed along with
the increase in the quantity, availability and importance of images in our daily life. However …
the increase in the quantity, availability and importance of images in our daily life. However …