Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Towards secure mobile cloud computing: A survey

AN Khan, MLM Kiah, SU Khan, SA Madani - Future generation computer …, 2013 - Elsevier
Mobile cloud computing is gaining popularity among mobile users. The ABI Research
predicts that the number of mobile cloud computing subscribers is expected to grow from …

A secure erasure code-based cloud storage system with secure data forwarding

HY Lin, WG Tzeng - IEEE transactions on parallel and …, 2011 - ieeexplore.ieee.org
A cloud storage system, consisting of a collection of storage servers, provides long-term
storage services over the Internet. Storing data in a third party's cloud system causes serious …

Efficient unidirectional proxy re-encryption

SSM Chow, J Weng, Y Yang, RH Deng - … , South Africa, May 3-6, 2010 …, 2010 - Springer
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally
intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …

Flexible end-to-end content security in CCN

CA Wood, E Uzun - 2014 IEEE 11th Consumer …, 2014 - ieeexplore.ieee.org
Content-centric networking (CCN) project, a flavor of information-centric networking (ICN),
decouples data from its source by shifting the emphasis from hosts and interfaces to …

Conditional identity-based broadcast proxy re-encryption and its application to cloud email

P Xu, T Jiao, Q Wu, W Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Recently, a number of extended Proxy Re-Encryptions (PRE), eg Conditional (CPRE),
identity-based PRE (IPRE) and broadcast PRE (BPRE), have been proposed for flexible …

Proxy re-encryption with keyword search

J Shao, Z Cao, X Liang, H Lin - Information Sciences, 2010 - Elsevier
We introduce a new cryptographic primitive, called proxy re-encryption with keyword search,
which is motivated by the following scenario in email systems: Charlie sends an encrypted …

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices

J Shao, R Lu, X Lin - IEEE INFOCOM 2014-IEEE Conference …, 2014 - ieeexplore.ieee.org
In this paper, we propose a fine-grained privacy-preserving location-based service (LBS)
framework, called FINE, for mobile devices. It adopts the data-as-a-service (DaaS) model …

Ordered-element naming for name-based packet forwarding

I Solis - US Patent 9,978,025, 2018 - Google Patents
A name-based content-forwarding system generates an ordered-element name for a content
item, and can process an interest to identify and perform an action that satisfies the interest …

Controlling the spread of interests and content in a content centric network

VL Jacobson, DK Smetters - US Patent 9,456,054, 2016 - Google Patents
2014/O146819 A1 5, 2014 Bae Secure Proxy Re-Encryption without Pairings. CANS. Spring
Lec 2014/O149733 A1 5, 2014 Kim ture Notes in Computer Science vol. 5339 (2008) …