Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts

H Deng, Q Wu, B Qin, J Domingo-Ferrer, L Zhang… - Information …, 2014 - Elsevier
Attribute-based encryption (ABE) systems allow encrypting to uncertain receivers by means
of an access policy specifying the attributes that the intended receivers should possess. ABE …

Threshold multi-keyword search for cloud-based group data sharing

Y Miao, RH Deng, KKR Choo, X Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Searchable Encryption (SE) is a popular cryptographic primitive for building ciphertexts
retrieval systems with far-reaching applications. However, existing SE schemes generally do …

A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs

S Pradeep, S Muthurajkumar, S Ganapathy… - Wireless Personal …, 2021 - Springer
In this paper, we propose a new cryptosystem based on matrix translation and Elliptic curve
cryptography for developing a secure routing algorithm to provide energy efficient and …

Cloud and IoT based privacy preserved e-Healthcare system using secured storage algorithm and deep learning

T Munirathinam, S Ganapathy… - Journal of Intelligent & …, 2020 - content.iospress.com
Rapid introduction of new diseases and the severity improvement of existing dead diseases
due to the bad food habits and lacking of awareness over the health conscious food items …

[PDF][PDF] 用于云存储的安全容错编码

谭鹏许, 陈越, 兰巨龙, 贾洪勇 - 通信学报, 2014 - infocomm-journal.com
针对当前基于RC 编码的容错技术的安全缺陷, 提出了一种安全编码——SRCS 编码,
以保证在云计算以及云存储这种高度开放环境下, 存储系统容错过程中数据的安全性 …

Efficient subtree-based encryption for fuzzy-entity data sharing

W Liu, J Liu, Q Wu, B Qin, D Naccache, H Ferradi - Soft Computing, 2018 - Springer
Cloud storage brings strong conveniences for flexible data sharing. When sharing data with
a large number of entities described with fuzzy identities, the data owners must leverage a …

Efficient attribute-based proxy re-encryption with constant size ciphertexts

A Paul, SSD Selvi, CP Rangan - … on Cryptology in India, Bangalore, India …, 2020 - Springer
Attribute-based proxy re-encryption (ABPRE) allows a semi-trusted proxy to transform an
encryption under an access-policy into an encryption under a new access policy, without …

[HTML][HTML] Efficient dynamic threshold identity-based encryption with constant-size ciphertext

W Susilo, F Guo, Y Mu - Theoretical Computer Science, 2016 - Elsevier
This paper revisits the notion of dynamic threshold identity-based encryption, due to the
recent practical interest. In this notion, an encryptor selects n recipients and a threshold …

BSA: Enabling Biometric-Based Storage and Authorization on Blockchain

J Ma, B Qi, K Lv - 2021 IEEE 20th International Conference on …, 2021 - ieeexplore.ieee.org
Blockchains are confronted with challenges to store private files and grant access,
especially for biometric-based schemes. We propose BSA, a biometric-based scheme for file …