Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system

BB Gupta, KC Li, VCM Leung… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
The concept of sharing of personal health data over cloud storage in a healthcare-cyber
physical system has become popular in recent times as it improves access quality. The …

A survey on FinTech

K Gai, M Qiu, X Sun - Journal of Network and Computer Applications, 2018 - Elsevier
As a new term in the financial industry, FinTech has become a popular term that describes
novel technologies adopted by the financial service institutions. This term covers a large …

Blockchain-based secure storage and access scheme for electronic medical records in IPFS

J Sun, X Yao, S Wang, Y Wu - IEEE access, 2020 - ieeexplore.ieee.org
Electronic medical records can help people prevent diseases, improve cure rates, provide a
significant basis for medical institutions and pharmaceutical companies, and provide legal …

User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage

J Li, W Yao, J Han, Y Zhang, J Shen - IEEE Systems Journal, 2017 - ieeexplore.ieee.org
Attribute-based encryption (ABE) can guarantee confidentiality and achieve fine-grained
data access control in a cloud storage system. Due to the fact that every attribute in ABE may …

Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

W Sun, S Yu, W Lou, YT Hou… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Search over encrypted data is a critically important enabling technique in cloud computing,
where encryption-before-outsourcing is a fundamental solution to protecting user data …

Towards secure FinTech: A survey, taxonomy, and open research challenges

S Mehrban, MW Nadeem, M Hussain, MM Ahmed… - Ieee …, 2020 - ieeexplore.ieee.org
Financial Technology (FinTech) has attracted a wide range of attention and is rapidly
proliferating. As a result of its consistent growth new terms have been introduced in this …

Lightweight fine-grained search over encrypted data in fog computing

Y Miao, J Ma, X Liu, J Weng, H Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Fog computing, as an extension of cloud computing, outsources the encrypted sensitive data
to multiple fog nodes on the edge of Internet of Things (IoT) to decrease latency and network …

Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing

W Zhang, Y Lin, S Xiao, J Wu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the advent of cloud computing, it has become increasingly popular for data owners to
outsource their data to public cloud servers while allowing data users to retrieve this data …