A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing

T Wang, J Zhou, X Chen, G Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Recent years witness the development of cloud computing technology. With the explosive
growth of unstructured data, cloud storage technology gets more attention and better …

[HTML][HTML] Research review on the application of homomorphic encryption in database privacy protection

Y Ma, J Zhao, K Li, Y Cao, H Chen… - International Journal of …, 2021 - igi-global.com
With the advent and development of database applications such as big data and data
mining, how to ensure the availability of data without revealing sensitive information has …

[HTML][HTML] Privacy-preserving security solution for cloud services

L Malina, J Hajny, P Dzurenda, V Zeman - Journal of applied research and …, 2015 - Elsevier
We propose a novel privacy-preserving security solution for cloud services. Our solution is
based on an efficient non-bilinear group signature scheme providing the anonymous access …

Privacy-preserving public auditing for non-manager group shared data

L Huang, G Zhang, A Fu - Wireless Personal Communications, 2018 - Springer
By the widespread use of cloud storage service, users get a lot of conveniences such as low-
price file remote storage and flexible file sharing. The research points in cloud computing …

[HTML][HTML] An efficient scheme of cloud data assured deletion

Y Tian, T Shao, Z Li - Mobile Networks and Applications, 2021 - Springer
With the rapid development of cloud storage technology, cloud data assured deletion has
received extensive attention. While ensuring the deletion of cloud data, users have also …

Fine-grained assured data deletion scheme based on attribute association

J Tian, Z Wang - Computers & Security, 2020 - Elsevier
With the rapid development of cloud computing technology, an increasing number of
enterprises and users store their data in the cloud to achieve convenient storage and data …

[PDF][PDF] 基于密码学的云数据确定性删除研究进展

熊金波, 李凤华, 王彦超, 马建峰, 姚志强 - 通信学报, 2016 - infocomm-journal.com
系统分析云环境中数据确定性删除面临的主要挑战, 指出云计算虚拟化与多租户的特征,
以及租赁, 按需交付的商业模式是云环境中存在诸多安全问题需要确定性删除服务的根本原因 …

A secure and efficient distributed storage scheme SAONT-RS based on an improved AONT and erasure coding

L Yao, J Lu, J Liu, D Wang, B Meng - IEEE Access, 2018 - ieeexplore.ieee.org
Distributed storage has been widely used by enterprises in big data and cloud computing.
However, the open nature of distributed storage and the geographical restrictions have …

Privacy-preserving public auditing for non-manager group

L Huang, G Zhang, A Fu - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
Cloud data privacy-preserving and integrity verification have become major research areas.
Many existing schemes use group signatures to make sure that the data stored in cloud is …

Multi-user searchable encryption voice in home IoT system

W Li, Y Xiao, C Tang, X Huang, J Xue - Internet of Things, 2020 - Elsevier
With the development of home IoT voice systems that can provide interfaces, such as
Amazon Alex, it is easy to disclose personal privacy when people search voice conveniently …