A manifesto for future generation cloud computing: Research directions for the next decade

R Buyya, SN Srirama, G Casale, R Calheiros… - ACM computing …, 2018 - dl.acm.org
The Cloud computing paradigm has revolutionised the computer science horizon during the
past decade and has enabled the emergence of computing as the fifth utility. It has captured …

Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Deterministic and efficiently searchable encryption

M Bellare, A Boldyreva, A O'Neill - … , Santa Barbara, CA, USA, August 19 …, 2007 - Springer
We present as-strong-as-possible definitions of privacy, and constructions achieving them,
for public-key encryption schemes where the encryption algorithm is deterministic. We …

TrustedDB: a trusted hardware based database with privacy and data confidentiality

S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries
with privacy and under regulatory compliance constraints without having to trust the service …

Processing private queries over untrusted data cloud through privacy homomorphism

H Hu, J Xu, C Ren, B Choi - 2011 IEEE 27th International …, 2011 - ieeexplore.ieee.org
Query processing that preserves both the data privacy of the owner and the query privacy of
the client is a new research problem. It shows increasing importance as cloud computing …

Combining fragmentation and encryption to protect privacy in data storage

V Ciriani, SDCD Vimercati, S Foresti, S Jajodia… - ACM Transactions on …, 2010 - dl.acm.org
The impact of privacy requirements in the development of modern applications is increasing
very quickly. Many commercial and legal regulations are driving the need to develop reliable …

Encryption policies for regulating access to outsourced data

SDCD Vimercati, S Foresti, S Jajodia… - ACM Transactions on …, 2010 - dl.acm.org
Current access control models typically assume that resources are under the strict custody of
a trusted party which monitors each access request to verify if it is compliant with the …

Data protection in outsourcing scenarios: Issues and directions

P Samarati, SDC Di Vimercati - Proceedings of the 5th ACM Symposium …, 2010 - dl.acm.org
Data outsourcing is an emerging paradigm that allows users and companies to give their
(potentially sensitive) data to external servers that then become responsible for their storage …

[图书][B] Computing handbook: Information systems and information technology

H Topi, A Tucker - 2014 - books.google.com
The second volume of this popular handbook demonstrates the richness and breadth of the
IS and IT disciplines. The book explores their close links to the practice of using, managing …

Managing and accessing data in the cloud: Privacy risks and approaches

SDC di Vimercati, S Foresti… - 2012 7th International …, 2012 - ieeexplore.ieee.org
Ensuring proper privacy and protection of the information stored, communicated, processed,
and disseminated in the cloud as well as of the users accessing such an information is one …