The increasing adoption of Cloud-based data processing and storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept it to be fully accessible to an external storage provider. Previous research in this area was mostly addressed at techniques to protect data stored on untrusted database servers; however, I argue that the Cloud architecture presents a number of specific problems and issues. This dissertation contains a detailed analysis of open issues. To handle them, I present a novel approach where confidential data is stored in a highly distributed partitioned database, partly located on the Cloud and partly on the clients. In my approach, data can be either private or shared...
Today many organisations and enterprises are using data from several sources either for strategic de...
Approximate computing has emerged as one of the areas studied over the past few years to improve the...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
There are two fundamental expectations from Cloud-IoT applications using sensitive and personal data...
Institutions and enterprises are moving towards more service availability, managed risk and at the s...
The fast capacity growth of cheap storage devices presents an ever-growing problem of scale for digi...
Context-awareness enables applications and services to better fulfil the needs of users by adapting ...
Privacy is an important property that is growing harder to keep as people develop new ways to steal ...
Building privacy policies into software systems can greatly increase the ease of handling sensitive ...
There is currently considerable enthusiasm around the MapReduce paradigm, and the distributed comput...
The cloud database is a relatively new type of distributed database that allows companies and indivi...
This thesis aims at developing a data visualization tool to enhance database learning based on the V...
In This paper the current security of various password hashing schemes that are in use today will be...
A central problem faced in distributed data storage and in peer to peer applications is the efficien...
The virtualization of IT infrastructure enables the consolidation and pooling of IT resources so tha...
Today many organisations and enterprises are using data from several sources either for strategic de...
Approximate computing has emerged as one of the areas studied over the past few years to improve the...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
There are two fundamental expectations from Cloud-IoT applications using sensitive and personal data...
Institutions and enterprises are moving towards more service availability, managed risk and at the s...
The fast capacity growth of cheap storage devices presents an ever-growing problem of scale for digi...
Context-awareness enables applications and services to better fulfil the needs of users by adapting ...
Privacy is an important property that is growing harder to keep as people develop new ways to steal ...
Building privacy policies into software systems can greatly increase the ease of handling sensitive ...
There is currently considerable enthusiasm around the MapReduce paradigm, and the distributed comput...
The cloud database is a relatively new type of distributed database that allows companies and indivi...
This thesis aims at developing a data visualization tool to enhance database learning based on the V...
In This paper the current security of various password hashing schemes that are in use today will be...
A central problem faced in distributed data storage and in peer to peer applications is the efficien...
The virtualization of IT infrastructure enables the consolidation and pooling of IT resources so tha...
Today many organisations and enterprises are using data from several sources either for strategic de...
Approximate computing has emerged as one of the areas studied over the past few years to improve the...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...