Survey on secure search over encrypted data on the cloud
H Pham, J Woodworth… - … : Practice and Experience, 2019 - Wiley Online Library
Cloud computing has become a potential resource for businesses and individuals to
outsource their data to remote but highly accessible servers. However, the potential of cloud …
outsource their data to remote but highly accessible servers. However, the potential of cloud …
Confidential computing across edge-to-cloud for machine learning: A survey study
Confidential computing has gained prominence due to the escalating volume of data-driven
applications (eg, machine learning and big data) and the acute desire for secure processing …
applications (eg, machine learning and big data) and the acute desire for secure processing …
Design and implementation of a modified AES cryptography with fast key generation technique
S Arman, T Rehnuma… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Cryptography is an emerging topic that has gained momentum since data explosion. With
the advent of data it has become more important to secure the data from external …
the advent of data it has become more important to secure the data from external …
Deep learning in IOT-based healthcare applications
Internet of Things (IoT) has emerged as the fastest developing technology in the field of
computing where connectivity among various types of devices is unified. Accessibility …
computing where connectivity among various types of devices is unified. Accessibility …
Clustcrypt: Privacy-preserving clustering of unstructured big data in the cloud
Security and confidentiality of big data stored in the cloud are important concerns for many
organizations to adopt cloud services. One common approach to address the concerns is …
organizations to adopt cloud services. One common approach to address the concerns is …
S3BD: Secure semantic search over encrypted big data in the cloud
JW Woodworth, M Amini Salehi - … and Computation: Practice …, 2019 - Wiley Online Library
Cloud storage is a widely utilized service for both personal and enterprise demands.
However, despite its advantages, many potential users with enormous amounts of sensitive …
However, despite its advantages, many potential users with enormous amounts of sensitive …
Saed: Edge-based intelligence for privacy-preserving enterprise search on the cloud
Cloud-based enterprise search services (eg, AWS Kendra) have been entrancing big data
owners by offering convenient and real-time search solutions to them. However, the problem …
owners by offering convenient and real-time search solutions to them. However, the problem …
[图书][B] AI-driven confidential computing across edge-to-cloud continuum
S Zobaed - 2022 - search.proquest.com
With the meteoric growth of technology, both individuals to organizations are widely
adopting cloud services to mitigate the burdens of maintenance. Despite its scalability and …
adopting cloud services to mitigate the burdens of maintenance. Despite its scalability and …
Privacy‐preserving clustering of unstructured big data for cloud‐based enterprise search solutions
S Zobaed, M Amini Salehi - Concurrency and Computation …, 2022 - Wiley Online Library
Cloud‐based enterprise search services (eg, Amazon Kendra) are enchanting to big data
owners by providing them with convenient search solutions over their enterprise big …
owners by providing them with convenient search solutions over their enterprise big …
Nocs2: Topic-based clustering of big data text corpus in the cloud
Cloud services are widely deployed to store and process big data. Organizations who deal
with big data, especially large document set, prefer utilizing cloud services for storage and …
with big data, especially large document set, prefer utilizing cloud services for storage and …