On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Issues and challenges of load balancing techniques in cloud computing: A survey

P Kumar, R Kumar - ACM computing surveys (CSUR), 2019 - dl.acm.org
With the growth in computing technologies, cloud computing has added a new paradigm to
user services that allows accessing Information Technology services on the basis of pay-per …

Everything as a service (XaaS) on the cloud: origins, current and future trends

Y Duan, G Fu, N Zhou, X Sun… - 2015 IEEE 8th …, 2015 - ieeexplore.ieee.org
For several years now, scientists have been proposing numerous models for defining
anything" as a service (aaS)", including discussions of products, processes, data & …

Secure kNN computation on encrypted databases

WK Wong, DW Cheung, B Kao… - Proceedings of the 2009 …, 2009 - dl.acm.org
Service providers like Google and Amazon are moving into the SaaS (Software as a
Service) business. They turn their huge infrastructure into a cloud-computing environment …

Executing SQL over encrypted data in the database-service-provider model

H Hacigümüş, B Iyer, C Li, S Mehrotra - Proceedings of the 2002 ACM …, 2002 - dl.acm.org
Rapid advances in networking and Internet technologies have fueled the emergence of the"
software as a service" model for enterprise computing. Successful examples of commercially …

Analytics over large-scale multidimensional data: the big data revolution!

A Cuzzocrea, IY Song, KC Davis - Proceedings of the ACM 14th …, 2011 - dl.acm.org
In this paper, we provide an overview of state-of-the-art research issues and achievements
in the field of analytics over big data, and we extend the discussion to analytics over big …

Blindfl: Vertical federated machine learning without peeking into your data

F Fu, H Xue, Y Cheng, Y Tao, B Cui - Proceedings of the 2022 …, 2022 - dl.acm.org
Due to the rising concerns on privacy protection, how to build machine learning (ML) models
over different data sources with security guarantees is gaining more popularity. Vertical …

Searchable encryption with secure and efficient updates

F Hahn, F Kerschbaum - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
Searchable (symmetric) encryption allows encryption while still enabling search for
keywords. Its immediate application is cloud storage where a client outsources its files while …

Hippocratic databases

R Agrawal, J Kiernan, R Srikant, Y Xu - VLDB'02: Proceedings of the 28th …, 2002 - Elsevier
Publisher Summary The Hippocratic Oath has guided the conduct of physicians for
centuries. Inspired by its tenet of preserving privacy, it has been argued that future database …

Secure nearest neighbor revisited

B Yao, F Li, X Xiao - … IEEE 29th international conference on data …, 2013 - ieeexplore.ieee.org
In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client
issues an encrypted query point E (q) to a cloud service provider and asks for an encrypted …