Enterprise data breach: causes, challenges, prevention, and future directions
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …
unauthorized parties. In the digital era, data has become one of the most critical components …
A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …
current cloud computing scenario. The majority of the existing techniques are focusing on …
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
Enabling keyword search directly over encrypted data is a desirable technique for effective
utilization of encrypted data outsourced to the cloud. Existing solutions provide multi …
utilization of encrypted data outsourced to the cloud. Existing solutions provide multi …
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …
Ensuring security and privacy preservation for cloud data services
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …
starting to outsource local data to the cloud servers. However, under open networks and not …
Towards privacy-preserving content-based image retrieval in cloud computing
Content-based image retrieval (CBIR) applications have been rapidly developed along with
the increase in the quantity, availability and importance of images in our daily life. However …
the increase in the quantity, availability and importance of images in our daily life. However …
Privacy protection and data security in cloud computing: a survey, challenges, and solutions
PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …
service. In recent years, there are many research schemes of cloud computing privacy …