On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020 - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …

Blockchain-based publicly verifiable data deletion scheme for cloud storage

C Yang, X Chen, Y Xiang - Journal of Network and Computer Applications, 2018 - Elsevier
With the rapid development of cloud storage, more and more data owners store their data on
the remote cloud, that can reduce data owners' overhead because the cloud server …

Obstacles to the adoption of secure communication tools

R Abu-Salma, MA Sasse, J Bonneau… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
The computer security community has advocated widespread adoption of secure
communication tools to counter mass surveillance. Several popular personal communication …

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends

F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum… - Computers & …, 2017 - Elsevier
Cloud computing has gained tremendous popularity in recent years. By outsourcing
computation and storage requirements to public providers and paying for the services used …

Sex, lies, or kittens? Investigating the use of Snapchat's self-destructing messages

F Roesner, BT Gill, T Kohno - … , FC 2014, Christ Church, Barbados, March 3 …, 2014 - Springer
The privacy-related Snapchat smartphone application allows users to share time-limited
photos or videos, which “disappear” after a specified number of seconds once opened. This …

Investigating the computer security practices and needs of journalists

SE McGregor, P Charters, T Holliday… - 24th USENIX Security …, 2015 - usenix.org
Though journalists are often cited as potential users of computer security technologies, their
practices and mental models have not been deeply studied by the academic computer …

Flashguard: Leveraging intrinsic flash properties to defend against encryption ransomware

J Huang, J Xu, X Xing, P Liu, MK Qureshi - Proceedings of the 2017 …, 2017 - dl.acm.org
Encryption ransomware is a malicious software that stealthily encrypts user files and
demands a ransom to provide access to these files. Several prior studies have developed …

Arx: An encrypted database using semantically secure encryption

R Poddar, T Boelter, RA Popa - Cryptology ePrint Archive, 2016 - eprint.iacr.org
In recent years, encrypted databases have emerged as a promising direction that provides
data confidentiality without sacrificing functionality: queries are executed on encrypted data …