Data security and privacy in cloud computing

Y Sun, J Zhang, Y Xiong, G Zhu - International Journal of …, 2014 - journals.sagepub.com
Data security has consistently been a major issue in information technology. In the cloud
computing environment, it becomes particularly serious because the data is located in …

Cloud computing security: from single to multi-clouds

MA AlZain, E Pardede, B Soh… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of …

[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.

MW Shih, S Lee, T Kim, M Peinado - NDSS, 2017 - ndss-symposium.org
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …

CryptDB: Protecting confidentiality with encrypted query processing

RA Popa, CMS Redfield, N Zeldovich… - Proceedings of the …, 2011 - dl.acm.org
Online applications are vulnerable to theft of sensitive information because adversaries can
exploit software bugs to gain access to private data, and because curious or malicious …

DepSky: dependable and secure storage in a cloud-of-clouds

A Bessani, M Correia, B Quaresma, F André… - Acm transactions on …, 2013 - dl.acm.org
The increasing popularity of cloud storage services has lead companies that handle critical
data to think about using these services for their storage needs. Medical record databases …

{zkLedger}:{Privacy-Preserving} auditing for distributed ledgers

N Narula, W Vasquez, M Virza - 15th USENIX symposium on networked …, 2018 - usenix.org
Distributed ledgers (eg blockchains) enable financial institutions to efficiently reconcile cross-
organization transactions. For example, banks might use a distributed ledger as a settlement …

Making {Geo-Replicated} systems fast as possible, consistent when necessary

C Li, D Porto, A Clement, J Gehrke, N Preguiça… - … USENIX Symposium on …, 2012 - usenix.org
Online services distribute and replicate state across geographically diverse data centers and
direct user requests to the closest or least loaded site. While effectively ensuring low latency …

Scalable and probabilistic leaderless BFT consensus through metastability

T Rocket, M Yin, K Sekniqi, R van Renesse… - arXiv preprint arXiv …, 2019 - arxiv.org
This paper introduces a family of leaderless Byzantine fault tolerance protocols, built around
a metastable mechanism via network subsampling. These protocols provide a strong …

Consistency in non-transactional distributed storage systems

P Viotti, M Vukolić - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Over the years, different meanings have been associated with the word consistency in the
distributed systems community. While in the'80s “consistency” typically meant strong …

[PDF][PDF] {SPORC}: Group Collaboration using Untrusted Cloud Resources

AJ Feldman, WP Zeller, MJ Freedman… - 9th USENIX Symposium …, 2010 - usenix.org
Cloud-based services are an attractive deployment model for user-facing applications like
word processing and calendaring. Unlike desktop applications, cloud services allow multiple …