On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

Key-aggregate cryptosystem for scalable data sharing in cloud storage

CK Chu, SSM Chow, WG Tzeng… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …

Expressive, efficient, and revocable data access control for multi-authority cloud storage

K Yang, X Jia - IEEE transactions on parallel and distributed …, 2013 - ieeexplore.ieee.org
Data access control is an effective way to ensure the data security in the cloud. Due to data
outsourcing and untrusted cloud servers, the data access control becomes a challenging …

云安全研究进展综述

俞能海, 郝卓, 徐甲甲, 张卫明, 张驰 - 电子学报, 2013 - ejournal.org.cn
随着云计算在学术界和工业界的兴起, 云计算也不可避免的带来了一些安全问题.
本文对云计算的安全需求进行了总结, 指出云计算不仅在机密性, 数据完整性 …

Storing shared data on the cloud via security-mediator

B Wang, SSM Chow, M Li, H Li - 2013 IEEE 33rd International …, 2013 - ieeexplore.ieee.org
Nowadays, many organizations outsource data storage to the cloud such that a member
(owner) of an organization can easily share data with other members (users). Due to the …

Healthfort: A cloud-based ehealth system with conditional forward transparency and secure provenance via blockchain

S Li, Y Zhang, C Xu, N Cheng, Z Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we propose a servers-aided password-based subsequent-key-locked
encryption mechanism to ensure the confidentiality of outsourced electronic health records …

Cryptographic solutions for cloud storage: Challenges and research opportunities

L Zhang, H Xiong, Q Huang, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
While cloud computing is relatively mature and its potential benefits well understood by
individual, industry and government consumers, a number of security and privacy concerns …

Cloud-assisted mobile-access of health data with privacy and auditability

Y Tong, J Sun, SSM Chow, P Li - IEEE Journal of biomedical …, 2013 - ieeexplore.ieee.org
Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and
the wild success of cloud service models, we propose to build privacy into mobile healthcare …

A framework based on RSA and AES encryption algorithms for cloud computing services

N Khanezaei, ZM Hanapi - 2014 IEEE conference on systems …, 2014 - ieeexplore.ieee.org
Cloud computing is an emerging computing model in which resources of the computing
communications are provided as services over the Internet. Privacy and security of cloud …