A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Brokering in interconnected cloud computing environments: A survey

SS Chauhan, ES Pilli, RC Joshi, G Singh… - Journal of Parallel and …, 2019 - Elsevier
Cloud computing provides computing platforms and facilitates to optimize utilization of
infrastructure resources, reduces deployment time and increases flexibility. The popularity of …

A cloud brokerage architecture for efficient cloud service selection

D Lin, AC Squicciarini, VN Dondapati… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
The expanding cloud computing services offer great opportunities for consumers to find the
best service and best pricing. Meanwhile, it also raises new challenges for consumers who …

When query authentication meets fine-grained access control: A zero-knowledge approach

C Xu, J Xu, H Hu, MH Au - … of the 2018 International Conference on …, 2018 - dl.acm.org
Query authentication has been extensively studied to ensure the integrity of query results for
outsourced databases, which are often not fully trusted. However, access control, another …

Efficient cloud service ranking based on uncertain user requirements

MH Nejat, H Motameni, H Vahdat-Nejad, B Barzegar - Cluster Computing, 2022 - Springer
In a cloud computing environment, there are many providers offering various services of
different quality attributes. Selecting a cloud service that meets user requirements from such …

Neighborhood trustworthiness‐based vehicle‐to‐vehicle authentication scheme for vehicular ad hoc networks

C Wang, L Xiao, J Shen… - … and Computation: Practice …, 2019 - Wiley Online Library
Vehicular ad hoc networks (VANETs) are a type of network, which have caused widespread
concern. Researchers have done many research on security and reliability of information …

MHB* T based dynamic data integrity auditing in cloud storage

W Luo, W Ma, J Gao - Cluster Computing, 2021 - Springer
Integrity audit technology is proposed to protect data in remote cloud servers from being
tampered with. However, the challenge is that the computational complexity is too large for …

A searchable and verifiable data protection scheme for scholarly big data

J Shen, C Wang, A Wang, S Ji… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Scientific research achievements play a positive role in the promotion of social development.
Scholarly big data include scholars' scientific research, experimental data, and their own …

[PDF][PDF] A Cloud Broker Framework for Infrastructure Service Discovery Using Semantic Network.

R Nagarajan, R Thirunavukarasu… - International Journal of …, 2018 - inass.org
On demand provisioning with an acceptable pricing scheme of cloud computing attracts user
to enter in to the cloud arena. In this paradigm, there are many cloud service providers …

TMM: trust management middleware for cloud service selection by prioritization

MB Smithamol, S Rajeswari - Journal of Network and Systems …, 2019 - Springer
Cloud computing is a prominently distributed paradigm that offers a wide variety of
infrastructure, platform, and software services over the internet on demand. However, the …