Towards public verifiable and forward-privacy encrypted search by using blockchain

Y Guo, C Zhang, C Wang, X Jia - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) is a practical cryptographic primitive that
assists servers to provide search and update functionalities in the ciphertext domain. Recent …

Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems

Y Miao, Y Yang, X Li, KKR Choo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of Intelligent Transportation System (ITS), a large number of
spatial data are generated in ITS. Although outsourcing spatial data to the cloud server can …

A blockchain-empowered arbitrable multimedia data auditing scheme in IoT cloud computing

S Wang, Y Zhang, Y Guo - Mathematics, 2022 - mdpi.com
As increasing clients tend to outsource massive multimedia data generated by Internet of
Things (IoT) devices to the cloud, data auditing is becoming crucial, as it enables clients to …

Privacy-preserving deduplication of sensor compressed data in distributed fog computing

C Zhang, Y Miao, Q Xie, Y Guo, H Du… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Distributed fog computing has received wide attention recently. It enables distributed
computing and data management on the network nodes within the close vicinity of IoT …

Privacy-preserving multi-range queries for secure data outsourcing services

Y Guo, H Xie, M Wang, X Jia - IEEE Transactions on Cloud …, 2022 - ieeexplore.ieee.org
Encrypted range query schemes that enable range-based searches over encrypted data
have become an effective solution for secure data outsourcing services. However, existing …

Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage

Q Tong, X Li, Y Miao, Y Wang, X Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Boolean range query (BRQ) is a typical type of spatial keyword query that is widely used in
geographic information systems, location-based services and other applications. It retrieves …

Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features

I Ullah, A Noor, S Nazir, F Ali, YY Ghadi… - The Journal of …, 2024 - Springer
The term" Internet of things (IoT)” refers to a network in which data from all connected
devices may be gathered, analyzed, and modified as per requirements to offer new services …

Toward prevention of parasite chain attack in iota blockchain networks by using evolutionary game model

Y Chen, Y Guo, Y Wang, R Bie - Mathematics, 2022 - mdpi.com
IOTA is a new cryptocurrency system designed for the Internet of Things based on directed
an acyclic graph structure. It has the advantages of supporting high concurrency, scalability …

PHRkNN: Efficient and privacy-preserving reverse kNN query over high-dimensional data in cloud

Y Zheng, H Zhu, R Lu, Y Guan, S Zhang… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Big data and bursting cloud computing technologies have facilitated an increasing trend of
outsourcing data-driven services to the cloud, where the reverse kNN (RkNN) query is a …

VC-DCPS: Verifiable cross-domain data collection and privacy-persevering sharing scheme based on lattice in blockchain-enhanced smart grids

PB Wang, KC Li, RH Shi… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of the era of Industry 4.0, blockchain-enhanced Smart Grids have received
widespread attention from academics and industry personnel, with its great advantages in …