Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat

MH Au, K Liang, JK Liu, R Lu, J Ning - Future Generation Computer …, 2018 - Elsevier
Bring your own devices have become a new symbol of industrial and education institutional
culture to date. A single individual can gain access to personal data anytime at anywhere of …

Secure -NN Query on Encrypted Cloud Data with Multiple Keys

K Cheng, L Wang, Y Shen, H Wang… - … Transactions on Big …, 2017 - ieeexplore.ieee.org
The k-nearest neighbors (k-NN) query is a fundamental primitive in spatial and multimedia
databases. It has extensive applications in location-based services, classification & …

A secure and cost-efficient offloading policy for mobile cloud computing against timing attacks

T Meng, K Wolter, H Wu, Q Wang - Pervasive and Mobile Computing, 2018 - Elsevier
Abstract In Mobile Cloud Computing (MCC), offloading is a popular technique proposed to
augment the capabilities of mobile systems by mitigating complex computation to …

Privacy-preserving deduplication of sensor compressed data in distributed fog computing

C Zhang, Y Miao, Q Xie, Y Guo, H Du… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Distributed fog computing has received wide attention recently. It enables distributed
computing and data management on the network nodes within the close vicinity of IoT …

Privacy-preserving image denoising from external cloud databases

Y Zheng, H Cui, C Wang, J Zhou - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Along with the rapid advancement of digital image processing technology, image denoising
remains a fundamental task, which aims to recover the original image from its noisy …

Secure content-based image retrieval in the cloud with key confidentiality

JS Li, IH Liu, CJ Tsai, ZY Su, CF Li, CG Liu - IEEE Access, 2020 - ieeexplore.ieee.org
Owing to the rapid development of cloud services and personal privacy demand, secure
cloud storage services and search over encrypted datasets have become an important …

Privacy-preserving similarity joins over encrypted data

X Yuan, X Wang, C Wang, C Yu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Similarity search on high-dimensional data has been intensively studied for data processing
and analytics. Despite its broad applicability, data security and privacy concerns along the …

Harnessing encrypted data in cloud for secure and efficient mobile image sharing

H Cui, X Yuan, C Wang - IEEE Transactions on Mobile …, 2016 - ieeexplore.ieee.org
Nowadays, large volumes of multimedia data are outsourced to the cloud to better serve
mobile applications. Along with this trend, highly correlated datasets can occur commonly …

Enabling secure and effective near-duplicate detection over encrypted in-network storage

H Cui, X Yuan, Y Zheng, C Wang - IEEE INFOCOM 2016-The …, 2016 - ieeexplore.ieee.org
Near-duplicate detection (NDD) plays an essential role for effective resource utilization and
possible traffic alleviation in many emerging network architectures, leveraging in-network …

Security and Performance Tradeoff Analysis of Offloading Policies in Mobile Cloud Computing

T Meng - 2017 - refubium.fu-berlin.de
While the last decades witness great advances in hardware technology, new mobile
applications have also become much more demanding. Hence, mobile devices still face the …