2015
DOI: 10.1016/j.is.2013.08.004
|View full text |Cite
|
Sign up to set email alerts
|

A secure data sharing and query processing framework via federation of cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(20 citation statements)
references
References 46 publications
0
13
0
Order By: Relevance
“…A very recent piece of work (Samanthula, et al 2015) complements previous work (Fernandes, et al 2014) (Subashini and Kavitha 2011), discussing the security risks involved with an emerging cloud service model: Data as a Service (DaaS). The typical usage scenario of this model is the one where the user data is outsourced to the cloud (e.g.…”
Section: Security Risks Of An Emerging Cloud Service Model: Data As Amentioning
confidence: 97%
“…A very recent piece of work (Samanthula, et al 2015) complements previous work (Fernandes, et al 2014) (Subashini and Kavitha 2011), discussing the security risks involved with an emerging cloud service model: Data as a Service (DaaS). The typical usage scenario of this model is the one where the user data is outsourced to the cloud (e.g.…”
Section: Security Risks Of An Emerging Cloud Service Model: Data As Amentioning
confidence: 97%
“…In this case, for high performance, data processing and analysis should be performed in parallel. [14] + + + + + + Ateniese [15] + + + + Bessani [16] + + + + + Bowers [17] + + + + + Celesti [9] + + + + Dimakis [18] + + + + + Erkin [19] + + + Gentry [20] + + Ghemawat [11] + + + + Gomathisankaran [21] + + + + + + Kong [22] + + + + + Li [23] + + + + + + Lin [24] + + + + + + Pang [25] + + + + + + Parakh 2011 [26] + + + + + + Parakh 2009 [27] + + + + + Ruj [28] + + + + Samanthula [29] + + Sathiamoorthy [30] + + + Shah [31] + + + Wang [32] + + + + + + Wylie [33] + + + + Yang [34] + + + + When storing data in the cloud, you should consider reliability, scalability, security, privacy. These features are also crucial for mobile devices where specifications and power consumption are limited.…”
Section: Overview Of Cloud Storage Security Approachesmentioning
confidence: 99%
“…Our solution is orthogonal to external audits by the owner of the objects, or by an external auditor . It is also complementary to encrypted storage of files in the cloud, with schemes such as the one in Samanthula et al…”
Section: Related Workmentioning
confidence: 99%