Q Zhou, H Dai, W Sheng, Y Liu, G Yang - World Wide Web, 2023 - Springer
Cloud computing is now being used by more and more enterprises and individuals. To protect the privacy of outsourced data in the cloud, the searchable symmetric encryption is …
Y Yang, Y Hu, X Dong, J Shen, Z Cao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has greatly changed our lives and generated a large amount of data. Cloud storage helps IoT limited-resource IoT devices process the massive data …
M Miao, S Zhao, J Li, J Wei - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
In various real-time applications like intelligent transportation and stock trading systems, clients continuously generate the so-called data streaming that is sensitive to both the …
SK Ocansey, CF Oduro - JOIV: International Journal on Informatics …, 2019 - joiv.org
When cloud clients outsource their database to the cloud, they entrust management operations to a cloud service provider who is expected to answer the client’ s queries on …