Blockchain meets cloud computing: A survey

K Gai, J Guo, L Zhu, S Yu - IEEE Communications Surveys & …, 2020 - ieeexplore.ieee.org
Blockchain technology has been deemed to be an ideal choice for strengthening existing
computing systems in varied manners. As one of the network-enabled technologies, cloud …

A survey of security issues for cloud computing

MA Khan - Journal of network and computer applications, 2016 - Elsevier
High quality computing services with reduced cost and improved performance have made
cloud computing a popular paradigm. Due to its flexible infrastructure, net centric approach …

[PDF][PDF] The control and communication management for ultra dense cloud system using fast Fourier algorithm

J Logeshwaran - ICTACT Journal on Data Science and Machine …, 2022 - researchgate.net
In general, software as a service (SAAS) is a model for the distribution of software that
customers have access to on the Internet. In SAAS, a service provider hosts the application …

An analysis of security issues for cloud computing

K Hashizume, DG Rosado… - Journal of internet …, 2013 - Springer
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing
business or consumer IT services over the Internet. However, cloud Computing presents an …

{DupLESS}:{Server-Aided} encryption for deduplicated storage

S Keelveedhi, M Bellare, T Ristenpart - 22nd USENIX security …, 2013 - usenix.org
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication
to save space by only storing one copy of each file uploaded. Should clients conventionally …

Secure deduplication with efficient and reliable convergent key management

J Li, X Chen, M Li, J Li, PPC Lee… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Data deduplication is a technique for eliminating duplicate copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …

Message-locked encryption and secure deduplication

M Bellare, S Keelveedhi, T Ristenpart - … on the theory and applications of …, 2013 - Springer
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …

A comprehensive study of the past, present, and future of data deduplication

W Xia, H Jiang, D Feng, F Douglis… - Proceedings of the …, 2016 - ieeexplore.ieee.org
Data deduplication, an efficient approach to data reduction, has gained increasing attention
and popularity in large-scale storage systems due to the explosive growth of digital data. It …

Flip feng shui: Hammering a needle in the software stack

K Razavi, B Gras, E Bosman, B Preneel… - 25th USENIX Security …, 2016 - usenix.org
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on …

Proofs of ownership in remote storage systems

S Halevi, D Harnik, B Pinkas… - Proceedings of the 18th …, 2011 - dl.acm.org
Cloud storage systems are becoming increasingly popular. A promising technology that
keeps their cost down is deduplication, which stores only a single copy of repeating data …