The R1-MYB Transcription Factor CmREVEILLE2 Activates Chlorophyll Biosynthesis to Mediate Light-Induced Greening in Chrysanthemum Flowers
- Authors
-
-
Dr. Elena M. Duarte
Department of Computer Science, University of LisbonAuthor
-
- Keywords:
- Cloud privacy, attribute-based encryption, encrypted query processing, zero-trust
- Abstract
-
Background: Cloud computing has enabled unprecedented scalability and flexibility but also introduced persistent challenges in preserving data confidentiality, fine-grained access control, privacy compliance, and trust among cloud consumers and providers (Pearson, 2009; Yu et al., 2010). Cryptographic techniques such as attribute-based encryption and encrypted query processing have offered compelling technical controls for protecting data at rest and during computation (Goyal et al., 2006; Popa et al., 2011; Kamara & Lauter, 2010). Complementary governance and operational frameworks—embodied in standards and guidance such as ISO/IEC 27018 and NIST SP 800-210—address policy and accountability but leave gaps when deployed in multi-tenant, co-located, and dynamic cloud environments (ISO/IEC 27018:2019; NIST, 800-210).
Objective: This article develops an integrated theoretical framework for resilient, privacy-preserving, and accountable data control in multi-tenant cloud environments. The framework synthesizes cryptographic access control, encrypted query processing, zero-trust architectural principles, and trust/accountability mechanisms to address both technical and socio-procedural threats identified in the literature (Yu et al., 2010; Popa et al., 2011; Hariharan, 2025; Ko et al., 2011).
Methods: We conduct an exhaustive conceptual analysis of existing techniques—attribute-based encryption, searchable and homomorphic encryption primitives, encrypted query processing, secure overlay storage, assured deletion, and co-residency and colocation resistance approaches—mapping each to threat scenarios in multi-tenant settings. The methodology articulates explicit design patterns and control compositions and evaluates them qualitatively against functional, performance, privacy, and trust dimensions reported in prior work (Goyal et al., 2006; Tang et al., 2012; Azar et al., 2014). We also construct normative guidance that aligns cryptographic controls with ISO/IEC 27018 and NIST access control recommendations (ISO/IEC 27018:2019; NIST SP 800-210).
Results: The integrated framework identifies five interoperable layers: (1) cryptographic data encapsulation for strong confidentiality and fine-grained access control (Yu et al., 2010; Goyal et al., 2006); (2) encrypted query processing to enable useful computation without wholesale plaintext exposure (Popa et al., 2011); (3) runtime zero-trust enforcement for identity, segmentation, and micro-policy mediation (Hariharan, 2025; NIST, 800-210); (4) co-residency and placement-aware defenses to reduce physical and side-channel risk (Bates et al., 2014; Azar et al., 2014); and (5) accountability and trust services to support auditability, verifiable deletion, and governance (Ko et al., 2011; Tang et al., 2012). For each layer we describe operational design choices, threat mappings, and tradeoffs in performance and complexity. The framework also prescribes patterns for composing controls (e.g., ABE for policy expression combined with CryptDB-style adjustable encryption for queryability) and guidelines for aligning these compositions with ISO and NIST controls.
Conclusions: No single technology solves the combined challenges of scale, expressivity, privacy, and trust in multi-tenant clouds. Instead, multi-layered control compositions—grounded in modern cryptography and complemented by zero-trust runtime enforcement and accountability mechanisms—provide the best path toward resilient, policy-aligned cloud operations (Kamara & Lauter, 2010; Hariharan, 2025; Ko et al., 2011). Our framework exposes clear tradeoffs and research directions, notably in usability of cryptographic policies, efficiency of encrypted query processing, and standardization of verifiable deletion and placement guarantees. The theoretical synthesis offers concrete design patterns for practitioners and a research agenda for the academic community.
- Downloads
-
Download data is not yet available.
- References
-
Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of IEEE INFOCOM, 1-9.
Popa, R. A., Redfield, C., Zeldovich, N., & Balakrishnan, H. (2011). CryptDB: Protecting confidentiality with encrypted query processing. Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 85-100.
Pearson, S. (2009). Taking account of privacy when designing cloud computing services. Proceedings of the International Conference on Cloud Computing, 44-52.
Kamara, S., & Lauter, K. (2010). Cryptographic cloud storage. Proceedings of Financial Cryptography and Data Security (FC), 136-149.
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of ACM CCS, 89-98.
Hariharan, R. (2025). Zero trust security in multi-tenant cloud environments. Journal of Information Systems Engineering and Management, 10.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587-1611.
Zhou, L., & Chao, H. (2011). Multimedia traffic security architecture for the internet of things. IEEE Network, 25(3), 35-40.
Tang, Y., Lee, P. P., Lui, J. C., & Shao, R. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing, 9(6), 903-916.
ISO/IEC 27018:2019. Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors.
NIST Special Publication 800-210. General Access Control Guidance for Cloud Systems. National Institute of Standards and Technology (NIST).
Bates, A., Mood, B., Pletcher, J., Pruse, H., Valafar, M., & Butler, K. (2014). On detecting co-resident cloud instances using network flow watermarking techniques. International Journal of Information Security, 13(2), 171-189.
Azar, Y., Kamara, S., Menache, I., Raykova, M., & Shepard, B. (2014). Colocation-resistant clouds. Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, 9-20.
Habib, S., Hauke, S., Ries, S., & Mhlhuser, M. (2012). Trust as a facilitator in cloud computing: a survey. Journal of Cloud Computing, 1(1).
Huang, J., & Nicol, D. (2013). Trust mechanisms for cloud computing. Journal of Cloud Computing, 2(1).
Ko, R., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., & Lee, B. S. (2011). Trustcloud: A framework for accountability and trust in cloud computing. IEEE World Congress on Services, 584-588.
- Downloads
- Published
- 2025-10-31
- Section
- Articles
- License
-
Copyright (c) 2025 Dr. Elena M. Duarte (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Similar Articles
- Dr. Jonathan M. Reynolds, Strategic Transformation of the Management Consulting Industry: Service Design, Business Models, and Value Creation in a Disrupted Global Market , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 9 (2025): Volume 4 Issue 9 2025
- Dr. Alejandro M. Torres, Artificial Intelligence–Enabled Financial Anomaly Detection and Reconciliation: Governance, Risk, and Explainability in Modern Accounting Ecosystems , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 8 (2025): Volume 04 Issue 08
- Prof. Dr. Stefan Lessmann, Hyper-Personalization, Analytics, and Artificial Intelligence in FinTech Ecosystems: Theoretical Foundations, Methodological Evolutions, and Socio-Technical Implications , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 12 (2025): Volume 04 Issue 12
- Dr. Pranav R. Kulshreshtha, Strategic Data Governance for Secure AI Adoption and Organizational Resilience: Addressing Challenges in SMEs and Large Enterprises , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 11 (2025): Volume 4 Issue 11 2025
- Dr. Miguel Alvarez, Artificial Intelligence-Driven Transformation of Fleet Management and Sustainable Transportation: Integrated Strategies, Theoretical Foundations, and Practical Implications , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 11 (2025): Volume 4 Issue 11 2025
- Dr. Matteo Alvarez, Strategic Migration from Oracle to PostgreSQL: Technical Foundations, Cost Implications, and Operational Frameworks for Reliable Enterprise Databases , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 11 (2025): Volume 4 Issue 11 2025
- Mselenge D Mooney, Dynamic Mechanical and Thermo-Mechanical Behavior of Natural Fiber Reinforced Polymer Composites: A Comprehensive Experimental-Theoretical Synthesis , Emerging Indexing of Global Multidisciplinary Journal: Vol. 2 No. 9 (2023): Volume 02 Issue 09 2023
- Dr. Alejandro M. Rivas, Adaptive FX Hedging and Predictive Learning Architectures for Crypto-Native Enterprises: Integrating Soft Computing, Deep Predictive Coding, and Game-Theoretic Decision Frameworks , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 11 (2025): Volume 4 Issue 11 2025
- Dr. Asha R. Menon, Resilience and Reconfiguration: Managing Semiconductor-Induced Disruptions in Automotive and Critical Supply Chains , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 11 (2025): Volume 4 Issue 11 2025
- Dr. Lukas M. Verhoeven, Integrating Artificial Intelligence and Advanced Data Processing for Real-Time Credit Scoring: Theoretical Foundations, Methodological Innovations, and Implications for Contemporary Credit Risk Management , Emerging Indexing of Global Multidisciplinary Journal: Vol. 4 No. 10 (2025): Volume 04 Issue 10
You may also start an advanced similarity search for this article.
