[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

Integrating encryption techniques for secure data storage in the cloud

B Seth, S Dalal, V Jaglan, DN Le… - Transactions on …, 2022 - Wiley Online Library
Cloud computing has emerged as one of the most groundbreaking technologies to have
redefined the bounds of conventional computing techniques. It has ushered in a paradigm …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

Y Zhang, RH Deng, X Liu, D Zheng - Information Sciences, 2018 - Elsevier
As an attractive business model of cloud computing, outsourcing services usually involve
online payment and security issues. The mutual distrust between users and outsourcing …

Efficient CP-ABE scheme with shared decryption in cloud storage

N Chen, J Li, Y Zhang, Y Guo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a preferred technology used to access control the data
stored in the cloud servers. However, in many cases, the authorized decryption user may be …

Certificateless public integrity checking of group shared data on cloud storage

J Li, H Yan, Y Zhang - IEEE Transactions on Services …, 2018 - ieeexplore.ieee.org
Cloud storage service supplies people with an efficient method to share data within a group.
The cloud server is not trustworthy, so lots of remote data possession checking (RDPC) …

Efficient identity-based provable multi-copy data possession in multi-cloud storage

J Li, H Yan, Y Zhang - IEEE Transactions on Cloud Computing, 2019 - ieeexplore.ieee.org
To increase the availability and durability of the outsourced data, many customers store
multiple copies on multiple cloud servers. To guarantee the integrity of multi-copies, some …

Lightweight fine-grained search over encrypted data in fog computing

Y Miao, J Ma, X Liu, J Weng, H Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Fog computing, as an extension of cloud computing, outsources the encrypted sensitive data
to multiple fog nodes on the edge of Internet of Things (IoT) to decrease latency and network …

Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical WSNs

Z Xu, D He, P Vijayakumar, BB Gupta… - IEEE Journal of …, 2021 - ieeexplore.ieee.org
With the application of wireless sensor network (WSN) in healthcare field, online sharing of
medical data has attracted more and more attention. However, wearable sensor nodes are …

Full verifiability for outsourced decryption in attribute based encryption

J Li, Y Wang, Y Zhang, J Han - IEEE transactions on services …, 2017 - ieeexplore.ieee.org
Attribute based encryption (ABE) is a popular cryptographic technology to protect the
security of users' data. However, the decryption cost and ciphertext size restrict the …