Articles with "encrypted cloud" as a keyword



Photo by lukaszlada from unsplash

OmniShare: Encrypted Cloud Storage for the Multi-Device Era

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Internet Computing"

DOI: 10.1109/mic.2018.043051462

Abstract: Two attractive features of cloud storage services are (1) the automatic synchronization of files between multiple devices and (2) the possibility of sharing files with other users. However, many users are concerned about the security… read more here.

Keywords: storage; client; cloud storage; encrypted cloud ... See more keywords

Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2017.2709318

Abstract: Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned… read more here.

Keywords: secure; verification; query results; encrypted cloud ... See more keywords
Photo from wikipedia

Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2020.3034232

Abstract: With the advent of cloud computing, explosively increasing images are gradually outsourced to the cloud server for costs saving and feasibility. For security and privacy concerns, images (e.g., medical diagnosis, personal photos) should be encrypted… read more here.

Keywords: controllable encrypted; encrypted cloud; cloud image; search ... See more keywords
Photo from wikipedia

You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2018.2864748

Abstract: The wide adoption of cloud greatly facilitates the sharing of explosively generated media content today, yet deprives content providers’ direct control over the outsourced media content. Thus, it is pivotal to build an encrypted cloud… read more here.

Keywords: access; encrypted cloud; media center; media content ... See more keywords
Photo by lukaszlada from unsplash

Game Theoretical Analysis on Encrypted Cloud Data Deduplication

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2019.2920402

Abstract: Duplicated data storage wastes memory resources and brings extra data-management load and cost to cloud service providers (CSPs). Various feasible schemes to deduplicate encrypted cloud data have been reported. However, their successful deployment in practice… read more here.

Keywords: theoretical analysis; game theoretical; cloud data; encrypted cloud ... See more keywords
Photo by lukaszlada from unsplash

Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Knowledge and Data Engineering"

DOI: 10.1109/tkde.2020.2983030

Abstract: Cloud computing is motivating data owners to outsource their databases to the cloud. However, for privacy concerns, the sensitive data has to be encrypted before outsourcing, which inevitably posts a challenging task for effective data… read more here.

Keywords: mml; cloud data; encrypted cloud; math ... See more keywords