Journal of the ACM (JACM)
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Multi-Dimensional Range Query over Encrypted Data
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Conjunctive, subset, and range queries on encrypted data
TCC'07 Proceedings of the 4th conference on Theory of cryptography
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
On the impossibility of cryptography alone for privacy-preserving cloud computing
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Strong non-leak guarantees for workflow models
Proceedings of the 2011 ACM Symposium on Applied Computing
Trustworthy clouds underpinning the future internet
The future internet
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
SEC'11 Proceedings of the 20th USENIX conference on Security
Direct anonymous attestation: enhancing cloud service user privacy
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part II
Home is safer than the cloud!: privacy concerns for consumer cloud storage
Proceedings of the Seventh Symposium on Usable Privacy and Security
Towards end-to-end secure content storage and delivery with public cloud
Proceedings of the second ACM conference on Data and Application Security and Privacy
Information Security Tech. Report
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
Proceedings of the 27th Annual ACM Symposium on Applied Computing
I feel lucky: an automated personal assistant for smartphones
Proceedings of the International Working Conference on Advanced Visual Interfaces
An autonomic cloud environment for hosting ECG data analysis services
Future Generation Computer Systems
The Cloud: Requirements for a Better Service
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Security analysis of public cloud computing
International Journal of Communication Networks and Distributed Systems
An efficient and secure data sharing framework using homomorphic encryption in the cloud
Proceedings of the 1st International Workshop on Cloud Intelligence
Cloud intelligence: what is REALLY new?
Proceedings of the 1st International Workshop on Cloud Intelligence
A framework for establishing trust in the Cloud
Computers and Electrical Engineering
Exploiting split browsers for efficiently protecting user data
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Online Randomization Strategies to Obfuscate User Behavioral Patterns
Journal of Network and Systems Management
A security aware stream data processing scheme on the cloud and its efficient execution methods
Proceedings of the fourth international workshop on Cloud data management
Flying into the hurricane: law, policy and practice implications of cloud computing
International Journal of Technology Policy and Law
AUDIO: an integrity auditing framework of outlier-mining-as-a-service systems
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
Abusing cloud-based browsers for fun and profit
Proceedings of the 28th Annual Computer Security Applications Conference
Privacy-aware searching with oblivious term matching for cloud storage
The Journal of Supercomputing
Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
International Journal of Cloud Applications and Computing
Compromising privacy in precise query protocols
Proceedings of the 16th International Conference on Extending Database Technology
Managing elasticity across multiple cloud providers
Proceedings of the 2013 international workshop on Multi-cloud applications and federated clouds
An approach for constructing private storage services as a unified fault-tolerant system
Journal of Systems and Software
Extensions to ciphertext-policy attribute-based encryption to support distributed environments
International Journal of Computer Applications in Technology
Efficient and secure data storage operations for mobile cloud computing
Proceedings of the 8th International Conference on Network and Service Management
Toward designing a secure biosurveillance cloud
The Journal of Supercomputing
A service-oriented framework for developing cross cloud migratable software
Journal of Systems and Software
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Cloudoscopy: services discovery and topology mapping
Proceedings of the 2013 ACM workshop on Cloud computing security workshop
Providing a data location assurance service for cloud storage environments
Journal of Mobile Multimedia
Verifiable network function outsourcing: requirements, challenges, and roadmap
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization
Classification of Security Issues and Solutions in Cloud Environments
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Information Sciences: an International Journal
Taking Advantage of Federated Cloud Storage and Multi-core Technology in Content Delivery
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Hi-index | 0.00 |
Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.