Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Multi-access edge computing architecture, data security and privacy: A review

B Ali, MA Gregory, S Li - IEEE Access, 2021 - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …

Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions

I Gupta, AK Singh, CN Lee, R Buyya - IEEE Access, 2022 - ieeexplore.ieee.org
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …

[HTML][HTML] A review on internet of things for defense and public safety

P Fraga-Lamas, TM Fernández-Caramés… - Sensors, 2016 - mdpi.com
The Internet of Things (IoT) is undeniably transforming the way that organizations
communicate and organize everyday businesses and industrial procedures. Its adoption has …

Securing e-health records using keyless signature infrastructure blockchain technology in the cloud

G Nagasubramanian, RK Sakthivel, R Patan… - Neural Computing and …, 2020 - Springer
Health record maintenance and sharing are one of the essential tasks in the healthcare
system. In this system, loss of confidentiality leads to a passive impact on the security of …

MedShare: A privacy-preserving medical data sharing system by using blockchain

M Wang, Y Guo, C Zhang, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Electronic Health Record (EHR) and its privacy have attracted widespread attention with the
development of the healthcare industry in recent years. As locking medical data in a single …

CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

M Tahir, M Sardaraz, Z Mehmood, S Muhammad - Cluster Computing, 2021 - Springer
Cloud Computing is referred to as a set of hardware and software that are being combined
to deliver various services of computing. The cloud keeps the services for delivery of …

MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption

SM Pournaghi, M Bayat, Y Farjami - Journal of Ambient Intelligence and …, 2020 - Springer
Abstract The development of Electronic Information Technology has made the Electronic
Medical Record a commonly used approach to recording and categorizing medical patient …