Security and privacy-enhancing multicloud architectures

JM Bohli, N Gruschka, M Jensen… - … on dependable and …, 2013 - ieeexplore.ieee.org
Security challenges are still among the biggest obstacles when considering the adoption of
cloud services. This triggered a lot of research activities, resulting in a quantity of proposals …

AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing

MA Hadavi, E Damiani, R Jalili, S Cimato… - … Privacy Management and …, 2013 - Springer
Researchers have been studying security challenges of database outsourcing for almost a
decade. Privacy of outsourced data is one of the main challenges when the “Database As a …

On the inference-proofness of database fragmentation satisfying confidentiality constraints

J Biskup, M Preuß, L Wiese - International Conference on Information …, 2011 - Springer
Confidentiality of information should be preserved despite the emergence of data
outsourcing. An existing approach is supposed to achieve confidentiality by vertical …

An effective private data storage and retrieval system using secret sharing scheme based on secure multi-party computation

DG Nair, VP Binu, GS Kumar - 2014 International Conference …, 2014 - ieeexplore.ieee.org
Privacy of the outsourced data is one of the major challenge. Insecurity of the network
environment and untrust-worthiness of the service providers are obstacles of making the …

Secure data outsourcing based on seed-residual shares and order-shuffling encryption

P Rahmani, SM Fakhrahmad, M Taheri - The Journal of Supercomputing, 2023 - Springer
Secret sharing is a promising approach to protecting the confidentiality of outsourced data.
However, the existing secret sharing-based data outsourcing schemes involve several …

An OBDD approach to enforce confidentiality and visibility constraints in data publishing

V Ciriani, S De Capitani di Vimercati… - Journal of …, 2012 - content.iospress.com
With the growing needs for data sharing and dissemination, privacy-preserving data
publishing is becoming an important issue that still requires further investigation. In this …

Separation of duties for multiple relations in cloud databases as an optimization problem

F Bollwein, L Wiese - Proceedings of the 21st International Database …, 2017 - dl.acm.org
Confidentiality concerns are important in the context of cloud databases. In this paper, the
technique of vertical fragmentation is explored to break sensitive associations between …

Enforcing confidentiality and data visibility constraints: An OBDD approach

V Ciriani, S De Capitani di Vimercati, S Foresti… - Data and Applications …, 2011 - Springer
The problem of enabling privacy-preserving data releases has become more and more
important in the last years thanks to the increasing needs of sharing and disseminating …

Data security and privacy using data partition and centric key management in cloud

K Patel, N Singh, K Parikh, KSS Kumar… - International …, 2014 - ieeexplore.ieee.org
The Cloud Computing is a next generation platform, which provides virtualization with
resource pool. There are three types of cloud service models, Infrastructure-as-a-Service …

Multicloud architecture for augmenting security in clouds

K Baby, A Vysala - 2015 global conference on communication …, 2015 - ieeexplore.ieee.org
Cloud computing is an important paradigm in this computing era which promises to reduce
the initial capital investment as well as operational expenditures for hardware and software …