Is Securing an Untrusted Cloud with Cryptography Still Economically Unviable?
Kevin KlassenJake SkinnerJoel CoffmanPublished in: UCC (2023)
Keyphrases
- information security
- encrypted data
- cloud computing
- sensitive data
- third party
- cellular automata
- data privacy
- privacy preserving
- data hiding
- network security
- security policies
- identity management
- data center
- virtual machine
- databases
- computing platform
- sql queries
- intrusion detection
- clustering algorithm
- encryption scheme
- computer vision
- machine learning
- real world