2016
DOI: 10.1016/j.future.2016.04.017
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Cryptography: Theory, Practice and Future Research Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 34 publications
(16 citation statements)
references
References 29 publications
0
16
0
Order By: Relevance
“…Most of the previous work done on SE to improve secrecy motivated by adversary activity [20], [21]. Some adversary activities include brute force attack [20], search/access pattern leakage [8], [21] and DDoS attack [5]. To proof that any scheme or algorithm developed was resistant enough from attacks or adversary activities, system model and threat model were constructed for experimental purposes [3], [14].…”
Section: Searchable Encryption (Se)mentioning
confidence: 99%
See 3 more Smart Citations
“…Most of the previous work done on SE to improve secrecy motivated by adversary activity [20], [21]. Some adversary activities include brute force attack [20], search/access pattern leakage [8], [21] and DDoS attack [5]. To proof that any scheme or algorithm developed was resistant enough from attacks or adversary activities, system model and threat model were constructed for experimental purposes [3], [14].…”
Section: Searchable Encryption (Se)mentioning
confidence: 99%
“…Cloud computing is one of advent technologies that support easy deployment application systems with a low-cost implementation which offer Pay-Per-Use basis [3], [4], [5], [6], [7]. The emergence of cloud or mobile computing dramatically emerges the growth of the mobile commerce, mobile learning, mobile health and mobile gaming [8] which acquire availability and reliability of services 24 by 7.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…There is, however, no perfect security and when a security incident involving cloud services occurs, digital investigation will require the identification, preservation and analysis of evidential data (Ab Rahman and Choo 2015;Quick, Martini and Choo 2013). Therefore, it is unsurprising that cloud security has seen significant research interest recently (Al Said and Rana 2014;Choo, Domingo-Ferrer and Zhang 2016;Li et al 2015;Rahulamathavan et al 2014). …”
Section: Introductionmentioning
confidence: 99%