An overview of multi-cloud computing

J Hong, T Dreibholz, JA Schenkel, JA Hu - … of the Workshops of the 33rd …, 2019 - Springer
The purpose of this paper is to provide a brief overview of cloud computing technologies,
particularly with respect to multi-cloud networks. First, the basics of cloud computing …

An integrated architecture for maintaining security in cloud computing based on blockchain

R Awadallah, A Samsudin, JS Teh… - IEEE Access, 2021 - ieeexplore.ieee.org
Due to its wide accessibility, cloud services are susceptible to attacks. Data manipulation is
a serious threat to data integrity which can occur in cloud computing-a relatively new offering …

A format-compatible searchable encryption scheme for JPEG images using bag-of-words

Z Xia, Q Ji, Q Gu, C Yuan, F Xiao - ACM Transactions on Multimedia …, 2022 - dl.acm.org
The development of cloud computing attracts enterprises and individuals to outsource their
data, such as images, to the cloud server. However, direct outsourcing causes the extensive …

[PDF][PDF] Verifiable homomorphic encrypted computations for cloud computing

R Awadallah, A Samsudin… - International Journal of …, 2021 - researchgate.net
Cloud computing is becoming an essential part of computing, especially for enterprises. As
the need for cloud computing increases, the need for cloud data privacy, confidentially, and …

Blockchain-based data integrity framework for Internet of Things

PM Chanal, MS Kakkasageri - International Journal of Information Security, 2024 - Springer
Abstract The Internet of Things (IoT) is one important digital revolution in both the academic
world and commerce. It brings convenience to people's daily lives; but, the challenges of …

[PDF][PDF] Cloud-based framework for efficient storage of unstructured patient health records

HM Abdallah, A Taha, MM Selim - International Journal of Computer …, 2019 - mecs-press.org
Recently, in healthcare sector, the data is steadily growing and becomes more vital. Most of
this data is embedded in the medical record of the patient. In fact, Patient Health Records …

Storage and communication security in cloud computing using a homomorphic encryption scheme based Weil pairing

DC Dogan, H Altindis - Elektronika ir Elektrotechnika, 2020 - eejournal.ktu.lt
With introduction of smart things into our lives, cloud computing is used in many different
areas and changes the communication method. However, cloud computing should …

[PDF][PDF] Blockchain based Data Integrity Framework for Internet of Things

PM Chanal, MS Kakkasageri - 2022 - scholar.archive.org
Abstract The Internet of Things (IoT) is one important digital revolution in both the academic
world and commerce. It brings convenience to people's daily lives; but, the challenges of …

One Improved RLWE-based FHE and Fast Private Information Retrieval

WT Song, B Hu, XF Zhao - KSII Transactions on Internet and …, 2019 - koreascience.kr
With the rapid development of cloud computing, it raises real questions on privacy
protection, which greatly limits the use of cloud computing. However, fully homomorphic …

Software Integrity Control

A Nikishova, T Omelchenko… - 2019 International …, 2019 - ieeexplore.ieee.org
In this article the tool for software integrity control is introduced. With its help the risk of
violation of enterprise's information system's software integrity can be reduced. The tool …