2019
DOI: 10.1016/j.asej.2019.03.002
|View full text |Cite
|
Sign up to set email alerts
|

Integrity and Confidentiality in Cloud Outsourced Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…A recently published work [52] introduces a new cloud service, namely ''database as a service'' (DBaaS), where a service provider has responsibility to grant access of software, hardware, and network to users. It would enable them to access and manage a database.…”
Section: A Security Threats and Risk Mitigation Strategies (Rq1)mentioning
confidence: 99%
“…A recently published work [52] introduces a new cloud service, namely ''database as a service'' (DBaaS), where a service provider has responsibility to grant access of software, hardware, and network to users. It would enable them to access and manage a database.…”
Section: A Security Threats and Risk Mitigation Strategies (Rq1)mentioning
confidence: 99%
“…The authors also proposed a method for storing data in a safe manner utilizing metadata. The authors of [12] compared several cryptographic algorithms, cryptographic data structures, Hash processes, digital signatures, and other cryptographic methods. Finally, the suggested architecture ensures data availability, confidentiality, privacy, and availability, among other things.…”
Section: Literature Surveymentioning
confidence: 99%
“…ey [27] also proposed a privacypreserving outsourced calculation toolkit, which allows data owners to securely outsource their data to the cloud for storage and calculation. Rady et al [28] designed a new architecture that achieves the confidentiality and integrity of query results of the outsourced database. Yu et al [29] devised a verifiable outsourced computation scheme over encrypted data by employing fully homomorphic encryption and polynomial factorization algorithm.…”
Section: E Other Work On Privacy Preservation For Machinementioning
confidence: 99%