The state of public infrastructure-as-a-service cloud security

W Huang, A Ganjali, BH Kim, S Oh, D Lie - ACM Computing Surveys …, 2015 - dl.acm.org
The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in
the past few years, with many cloud service providers fielding competing services. Despite …

[HTML][HTML] A comprehensive review of energy harvesting and routing strategies for IoT sensors sustainability and communication technology

HNS Aldin, MR Ghods, F Nayebipour, MN Torshiz - Sensors International, 2023 - Elsevier
The effectiveness and dependability of network communication within the Internet of Things
(IoT) depends on the energy-harvesting capabilities of IoT sensors. It is imperative to …

{DORY}: An encrypted search system with distributed trust

E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …

Practical privacy-preserving content-based retrieval in cloud image repositories

B Ferreira, J Rodrigues, J Leitao… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Storage requirements for visual data have been increasing in recent years, following the
emergence of many highly interactive multimedia services and applications for mobile …

Cobra: Making Transactional {Key-Value} Stores Verifiably Serializable

C Tan, C Zhao, S Mu, M Walfish - 14th USENIX Symposium on …, 2020 - usenix.org
Today's cloud databases offer strong properties, including serializability, sometimes called
the gold standard database correctness property. But cloud databases are complicated …

Privacy-preserving content-based image retrieval in the cloud

B Ferreira, J Rodrigues, J Leitao… - 2015 IEEE 34th …, 2015 - ieeexplore.ieee.org
Storage requirements for visual data have been increasing in recent years, following the
emergence of many new highly interactive multimedia services and applications for both …

Ghostor: Toward a Secure {Data-Sharing} System from Decentralized Trust

Y Hu, S Kumar, RA Popa - 17th USENIX Symposium on Networked …, 2020 - usenix.org
Data-sharing systems are often used to store sensitive data. Both academia and industry
have proposed numerous solutions to protect the user privacy and data integrity from a …

Verena: End-to-end integrity protection for web applications

N Karapanos, A Filios, RA Popa… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
Web applications rely on web servers to protect the integrity of sensitive information.
However, an attacker gaining access to web servers can tamper with the data and query …

ChainFS: Blockchain-secured cloud storage

Y Tang, Q Zou, J Chen, K Li… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
This work presents ChainFS, a middleware system that secures cloud storage services
using a minimally trusted Blockchain. ChainFS hardens the cloud-storage security against …

Maliciously secure multi-client ORAM

M Maffei, G Malavolta, M Reinert… - Applied Cryptography and …, 2017 - Springer
Oblivious RAM (ORAM) has emerged as an enabling technology to secure cloud-based
storage services. The goal of this cryptographic primitive is to conceal not only the data but …