Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

Security and privacy-preserving challenges of e-health solutions in cloud computing

S Chenthara, K Ahmed, H Wang, F Whittaker - IEEE access, 2019 - ieeexplore.ieee.org
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …

Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain

A Zhang, X Lin - Journal of medical systems, 2018 - Springer
Electronic health record sharing can help to improve the accuracy of diagnosis, where
security and privacy preservation are critical issues in the systems. In recent years …

Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search

H Li, Q Huang, J Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

Q Huang, H Li - Information Sciences, 2017 - Elsevier
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …

VABKS: Verifiable attribute-based keyword search over outsourced encrypted data

Q Zheng, S Xu, G Ateniese - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …

A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Cryptographic cloud storage

S Kamara, K Lauter - … Conference on Financial Cryptography and Data …, 2010 - Springer
We consider the problem of building a secure cloud storage service on top of a public cloud
infrastructure where the service provider is not completely trusted by the customer. We …

Certificateless searchable public key encryption scheme for industrial internet of things

M Ma, D He, N Kumar, KKR Choo… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the widespread adoption of Internet of Things and cloud computing in different industry
sectors, an increasing number of individuals or organizations are outsourcing their Industrial …

Dual-server public-key encryption with keyword search for secure cloud storage

R Chen, Y Mu, G Yang, F Guo… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Searchable encryption is of increasing interest for protecting the data privacy in secure
searchable cloud storage. In this paper, we investigate the security of a well-known …