Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Searchable symmetric encryption: Designs and challenges
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …
encrypted data without the risk of data leakage. Despite the widespread interest, existing …
Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function
In today's world, a substantial number of digital images are conserved and transmitted
through diverse online platforms on a daily basis. Preserving the confidentiality of images is …
through diverse online platforms on a daily basis. Preserving the confidentiality of images is …
Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm
Today, Internet users who share personal and professional data are concerned about the
safety of the data. Encryption is one way to safeguard sensitive and private data on internet …
safety of the data. Encryption is one way to safeguard sensitive and private data on internet …
[HTML][HTML] A novel homomorphic approach for preserving privacy of patient data in telemedicine
Globally, the surge in disease and urgency in maintaining social distancing has reawakened
the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the …
the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the …
Blockchain-enabled searchable encryption in clouds: a review
HB How, SH Heng - Journal of Information Security and Applications, 2022 - Elsevier
Nowadays, the demand of storage and computational resources is increasing. As a result,
the number of organisations and individuals that outsource their data to cloud is also …
the number of organisations and individuals that outsource their data to cloud is also …
Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data
Outsourcing confidential data to cloud storage leads to privacy challenges that can be
reduced using encryption. However, with encryption in place, the utilization of the data is …
reduced using encryption. However, with encryption in place, the utilization of the data is …
[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
SS Pericherla - ISeCure, 2023 - sid.ir
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …
internal digital resources and workloads. One major drawback or limitation of cloud …
Searchable encryption: A survey
D Sharma - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
We explore the field of searchable encryption (SE) and present a comprehensive survey of
relevant literature. Since the existing survey articles are primarily written for the security …
relevant literature. Since the existing survey articles are primarily written for the security …
Survey on data deduplication in cloud storage environments
WB Kim, IY Lee - Journal of Information Processing Systems, 2021 - koreascience.kr
Data deduplication technology improves data storage efficiency while storing and managing
large amounts of data. It reduces storage requirements by determining whether replicated …
large amounts of data. It reduces storage requirements by determining whether replicated …