How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective

Z Wu, S Xuan, J Xie, C Lin, C Lu - Computers in biology and medicine, 2022 - Elsevier
From a technical perspective, for electronic medical records (EMR), this paper proposes an
effective confidential management solution on the cloud, whose basic idea is to deploy a …

Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination

Y Shen, S Shen, Z Wu, H Zhou, S Yu - Journal of Information Security and …, 2022 - Elsevier
IoT malware dissemination seriously exacerbates the decline of IoT system availability,
which deteriorates the users experience. To address the issue, we first predict the optimal …

An effective method for the protection of user health topic privacy for health information services

Z Wu, H Liu, J Xie, G Xu, G Li, C Lu - World Wide Web, 2023 - Springer
With the rapid development of emerging network technologies such as cloud computing, the
background server-side of public health information services is widely deployed on the …

A confusion method for the protection of user topic privacy in Chinese keyword-based book retrieval

Z Wu, J Xie, S Shen, C Lin, G Xu, E Chen - ACM transactions on asian …, 2023 - dl.acm.org
In this article, aiming at a Chinese keyword-based book search service, from a technological
perspective, we propose to modify a user query sequence carefully to confuse the user …

A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain

X Yang, W Li, K Fan - Peer-to-peer Networking and Applications, 2023 - Springer
With the development of digital healthcare, sharing electronic medical record data has
become an indispensable part of improving medical conditions. Aiming at the centralized …

ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications

AK Mishra, M Wazid, DP Singh, AK Das… - … on Network Science …, 2023 - ieeexplore.ieee.org
The most significant and critical infrastructures, such as the electricity utilities, clean water
facilities, nuclear plants and manufacturing industries are controlled and supervised by the …

[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

Secure and Real Time Traceable Data Sharing in Cloud-Assisted IoT

J Lu, W Li, J Sun, R Xiao, B Liao - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) has become an increasingly popular paradigm to
greatly improve the performance of IoT applications by delegating the cloud to manage the …

A zero-trust network-based access control scheme for sustainable and resilient industry 5.0

KA Abuhasel - IEEE Access, 2023 - ieeexplore.ieee.org
This new era of the industry is characterized by the integration of artificial intelligence and
the Internet of Things (IoT) to optimize production processes. To ensure sustainability and …