Identity-based encryption with outsourced equality test in cloud computing

S Ma - Information Sciences, 2016 - Elsevier
We firstly combine the concepts of public key encryption with equality test (PKEET) and
identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET) …

Cloud computing security: challenges and future trends

T Radwan, MA Azer… - International Journal of …, 2017 - inderscienceonline.com
Cloud computing is one of the most trendy terminologies. Cloud providers aim to satisfy
clients' requirements for computing resources such as services, applications, networks …

A secure searchable encryption scheme for cloud using hash-based indexing

N Andola, S Prakash, VK Yadav, S Venkatesan… - Journal of Computer and …, 2022 - Elsevier
Cloud service for data outsourcing has triggered security and privacy needs that can be
satisfied by encrypting data prior to outsourcing to the cloud. Searchable Encryption that …

Authentication and access control in e-health systems in the cloud

N Kahani, K Elgazzar, JR Cordy - … on big data security on cloud …, 2016 - ieeexplore.ieee.org
The opportunity to access on-demand, unbounded computation and storage resources has
increasingly motivated users to move their health records from local data centers to the …

A comprehensive and holistic knowledge model for cloud privacy protection

A Akremi, M Rouached - The Journal of Supercomputing, 2021 - Springer
Although Cloud computing is gaining popularity by supporting data analysis in an
outsourced and cost-effective way, it brings serious privacy issues when sending the original …

[HTML][HTML] An innovative privacy preserving technique for incremental datasets on cloud computing

YAAS Aldeen, M Salleh, Y Aljeroudi - Journal of biomedical informatics, 2016 - Elsevier
Cloud computing (CC) is a magnificent service-based delivery with gigantic computer
processing power and data storage across connected communications channels. It imparted …

Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data

R Handa, CR Krishna… - … and Computation: Practice …, 2019 - Wiley Online Library
Outsourcing confidential data to cloud storage leads to privacy challenges that can be
reduced using encryption. However, with encryption in place, the utilization of the data is …

Privacy-preserving and dynamic multi-attribute conjunctive keyword search over encrypted cloud data

L Zhang, Y Zhang, H Ma - IEEE Access, 2018 - ieeexplore.ieee.org
With the increasing popularity of cloud computing, a growing data owners are motivated to
outsource their huge data to cloud servers in order to facilitate access and save data …

An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system

Y Wu, X Lu, J Su, P Chen - Journal of medical systems, 2016 - Springer
Preserving the privacy of electronic medical records (EMRs) is extremely important
especially when medical systems adopt cloud services to store patients' electronic medical …

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

C Meshram, CC Lee, SG Meshram, MK Khan - Soft computing, 2019 - Springer
The advancement of the cloud storage technology opens up a wide range of possibilities for
adaptable data sharing. When sharing data to an extensive number of users with fuzzy …