Blockchain meets cloud computing: A survey
Blockchain technology has been deemed to be an ideal choice for strengthening existing
computing systems in varied manners. As one of the network-enabled technologies, cloud …
computing systems in varied manners. As one of the network-enabled technologies, cloud …
A survey of security issues for cloud computing
MA Khan - Journal of network and computer applications, 2016 - Elsevier
High quality computing services with reduced cost and improved performance have made
cloud computing a popular paradigm. Due to its flexible infrastructure, net centric approach …
cloud computing a popular paradigm. Due to its flexible infrastructure, net centric approach …
[PDF][PDF] The control and communication management for ultra dense cloud system using fast Fourier algorithm
J Logeshwaran - ICTACT Journal on Data Science and Machine …, 2022 - researchgate.net
In general, software as a service (SAAS) is a model for the distribution of software that
customers have access to on the Internet. In SAAS, a service provider hosts the application …
customers have access to on the Internet. In SAAS, a service provider hosts the application …
An analysis of security issues for cloud computing
K Hashizume, DG Rosado… - Journal of internet …, 2013 - Springer
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing
business or consumer IT services over the Internet. However, cloud Computing presents an …
business or consumer IT services over the Internet. However, cloud Computing presents an …
{DupLESS}:{Server-Aided} encryption for deduplicated storage
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication
to save space by only storing one copy of each file uploaded. Should clients conventionally …
to save space by only storing one copy of each file uploaded. Should clients conventionally …
Secure deduplication with efficient and reliable convergent key management
Data deduplication is a technique for eliminating duplicate copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …
widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …
Message-locked encryption and secure deduplication
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …
where the key under which encryption and decryption are performed is itself derived from …
A comprehensive study of the past, present, and future of data deduplication
Data deduplication, an efficient approach to data reduction, has gained increasing attention
and popularity in large-scale storage systems due to the explosive growth of digital data. It …
and popularity in large-scale storage systems due to the explosive growth of digital data. It …
Flip feng shui: Hammering a needle in the software stack
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on …
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on …
Proofs of ownership in remote storage systems
Cloud storage systems are becoming increasingly popular. A promising technology that
keeps their cost down is deduplication, which stores only a single copy of repeating data …
keeps their cost down is deduplication, which stores only a single copy of repeating data …