[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

DeepFakE: improving fake news detection using tensor decomposition-based deep neural network

RK Kaliyar, A Goswami, P Narang - The Journal of Supercomputing, 2021 - Springer
Social media platforms have simplified the sharing of information, which includes news as
well, as compared to traditional ways. The ease of access and sharing the data with the …

Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage

Y Zhang, C Xu, J Ni, H Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud storage enables users to outsource data to storage servers and retrieve target data
efficiently. Some of the outsourced data are very sensitive and should be prevented for any …

A privacy-preserving and untraceable group data sharing scheme in cloud computing

J Shen, H Yang, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the development of cloud computing, the great amount of storage data requires safe
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption

D Unal, A Al-Ali, FO Catak, M Hammoudeh - Future Generation Computer …, 2021 - Elsevier
Data security is a challenge for end-users of cloud services as the users have no control
over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider …

Public-key authenticated encryption with keyword search: Cryptanalysis, enhanced security, and quantum-resistant instantiation

ZY Liu, YF Tseng, R Tso, M Mambo… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
With the rapid development of cloud computing, an increasing number of companies are
adopting cloud storage technology to reduce overhead. However, to ensure the privacy of …

CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors

X Zhang, J Zhao, C Xu, H Li, H Wang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Wireless body area networks (WBANs) rely on powerful cloud storage services to manage
massive medical data. As precise medical diagnosis analysis is heavily based on these …

Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud

Y Miao, F Li, X Li, Z Liu, J Ning, H Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Electronic health (e-health) systems may outsource data such as patient e-health records to
mobile cloud servers for efficiency gains (eg, minimizing local storage and computation …

A survey of public-key encryption with search functionality for cloud-assisted IoT

H Xiong, T Yao, H Wang, J Feng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …