On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Searchable symmetric encryption: Designs and challenges

GS Poh, JJ Chin, WC Yau, KKR Choo… - ACM Computing …, 2017 - dl.acm.org
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …

Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function

B Rahul, K Kuppusamy, A Senthilrajan - Optik, 2023 - Elsevier
In today's world, a substantial number of digital images are conserved and transmitted
through diverse online platforms on a daily basis. Preserving the confidentiality of images is …

Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

B Rahul, K Kuppusamy, A Senthilrajan - Multimedia Tools and …, 2023 - Springer
Today, Internet users who share personal and professional data are concerned about the
safety of the data. Encryption is one way to safeguard sensitive and private data on internet …

[HTML][HTML] A novel homomorphic approach for preserving privacy of patient data in telemedicine

Y Iqbal, S Tahir, H Tahir, F Khan, S Saeed… - Sensors, 2022 - mdpi.com
Globally, the surge in disease and urgency in maintaining social distancing has reawakened
the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the …

Blockchain-enabled searchable encryption in clouds: a review

HB How, SH Heng - Journal of Information Security and Applications, 2022 - Elsevier
Nowadays, the demand of storage and computational resources is increasing. As a result,
the number of organisations and individuals that outsource their data to cloud is also …

Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data

R Handa, CR Krishna… - … and Computation: Practice …, 2019 - Wiley Online Library
Outsourcing confidential data to cloud storage leads to privacy challenges that can be
reduced using encryption. However, with encryption in place, the utilization of the data is …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISeCure, 2023 - sid.ir
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

Searchable encryption: A survey

D Sharma - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
We explore the field of searchable encryption (SE) and present a comprehensive survey of
relevant literature. Since the existing survey articles are primarily written for the security …

Survey on data deduplication in cloud storage environments

WB Kim, IY Lee - Journal of Information Processing Systems, 2021 - koreascience.kr
Data deduplication technology improves data storage efficiency while storing and managing
large amounts of data. It reduces storage requirements by determining whether replicated …