Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0

Y Wu, HN Dai, H Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Critical infrastructure systems are vital to underpin the functioning of a society and economy.
Due to the ever-increasing number of Internet-connected Internet-of-Things (IoT)/Industrial …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing

Z Xia, L Jiang, D Liu, L Lu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Content-based Image Retrieval (CBIR) techniques have been extensively studied with the
rapid growth of digital images. Generally, CBIR service is quite expensive in computational …

ROSE: Robust searchable encryption with forward and backward security

P Xu, W Susilo, W Wang, T Chen, Q Wu… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a
promising technique to delegate update and search queries over an outsourced database to …

Security issues in cloud and mobile cloud: A comprehensive survey

GU Srikanth, LC Jaffrin - Information Security Journal: A Global …, 2022 - Taylor & Francis
Cloud computing is one of the rapidly growing technologies in computing. It includes many
benefits such as improved reliability, enormous scalability, decreased costs, portability …

Privacy-preserving threshold-based image retrieval in cloud-assisted Internet of Things

L Song, Y Miao, J Weng, KKR Choo… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Encrypted image retrieval is a promising technique for achieving data confidentiality and
searchability the in cloud-assisted Internet of Things (IoT) environment. However, most of the …

A privacy-preserving JPEG image retrieval scheme using the local Markov feature and bag-of-words model in cloud computing

P Yu, J Tang, Z Xia, Z Li, J Weng - IEEE Transactions on Cloud …, 2023 - ieeexplore.ieee.org
The development of cloud computing attracts a great deal of image owners to upload their
images to the cloud server to save the local storage. But privacy becomes a great concern to …

Privacy-preserving cloud computing: ecosystem, life cycle, layered architecture and future roadmap

S Ahmadi, M Salehfar - arXiv preprint arXiv:2204.11120, 2022 - arxiv.org
Privacy-Preserving Cloud Computing is an emerging technology with many applications in
various fields. Cloud computing is important because it allows for scalability, adaptability …

Privacy preserving and serverless homomorphic-based searchable encryption as a service (SEaaS)

M Ihtesham, S Tahir, H Tahir, A Hasan, A Sultan… - IEEE …, 2023 - ieeexplore.ieee.org
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and
deployment agility, embraced by both cloud providers and users. However, this surge in …

Synthesizing privacy preserving traces: Enhancing plausibility with social networks

P Zhao, H Jiang, J Li, F Zeng, X Zhu… - … /ACM Transactions on …, 2019 - ieeexplore.ieee.org
Due to the popularity of mobile computing and mobile sensing, users' traces can now be
readily collected to enhance applications' performance. However, users' location privacy …