Enterprise data breach: causes, challenges, prevention, and future directions

L Cheng, F Liu, D Yao - Wiley Interdisciplinary Reviews: Data …, 2017 - Wiley Online Library
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …

A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data

Z **a, X Wang, X Sun, Q Wang - IEEE transactions on parallel …, 2015 - ieeexplore.ieee.org
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …

A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing

Z **a, X Wang, L Zhang, Z Qin, X Sun… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …

Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement

Z Fu, X Wu, C Guan, X Sun… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud

B Wang, S Yu, W Lou, YT Hou - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Enabling keyword search directly over encrypted data is a desirable technique for effective
utilization of encrypted data outsourced to the cloud. Existing solutions provide multi …

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

N Kaaniche, M Laurent - Computer Communications, 2017 - Elsevier
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …

Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Towards privacy-preserving content-based image retrieval in cloud computing

Z **a, Y Zhu, X Sun, Z Qin, K Ren - IEEE Transactions on Cloud …, 2015 - ieeexplore.ieee.org
Content-based image retrieval (CBIR) applications have been rapidly developed along with
the increase in the quantity, availability and importance of images in our daily life. However …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …