A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Towards public verifiable and forward-privacy encrypted search by using blockchain

Y Guo, C Zhang, C Wang, X Jia - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) is a practical cryptographic primitive that
assists servers to provide search and update functionalities in the ciphertext domain. Recent …

AESM2 Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems

M Wang, Y Miao, Y Guo, H Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the rapid development of cloud computing, it is popular for data owners to outsource
massive data to the cloud server for data sharing. To protect the privacy of sensitive data …

Hybridx: New hybrid index for volume-hiding range queries in data outsourcing services

K Ren, Y Guo, J Li, X Jia, C Wang… - 2020 IEEE 40th …, 2020 - ieeexplore.ieee.org
An encrypted index is a data structure that assisting untrusted servers to provide various
query functionalities in the ciphertext domain. Although traditional index designs can prevent …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Building in-the-cloud network functions: Security and privacy challenges

P Jiang, Q Wang, M Huang, C Wang, Q Li… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Network function virtualization (NFV) has been promising to improve the availability,
programmability, and flexibility of network function deployment and communication facilities …

Privacy-preserving cloud computing: ecosystem, life cycle, layered architecture and future roadmap

S Ahmadi, M Salehfar - arXiv preprint arXiv:2204.11120, 2022 - arxiv.org
Privacy-Preserving Cloud Computing is an emerging technology with many applications in
various fields. Cloud computing is important because it allows for scalability, adaptability …

Towards efficient verifiable boolean search over encrypted cloud data

F Li, J Ma, Y Miao, Z Liu, KKR Choo… - … on Cloud Computing, 2021 - ieeexplore.ieee.org
Symmetric Searchable Encryption (SSE) schemes facilitate searching over encrypted data,
and have been extensively explored to improve function, efficiency or security. There are …

Privacy-preserving multi-range queries for secure data outsourcing services

Y Guo, H Xie, M Wang, X Jia - IEEE Transactions on Cloud …, 2022 - ieeexplore.ieee.org
Encrypted range query schemes that enable range-based searches over encrypted data
have become an effective solution for secure data outsourcing services. However, existing …

PFcrowd: Privacy-preserving and federated crowdsourcing framework by using blockchain

C Zhang, Y Guo, H Du, X Jia - 2020 IEEE/ACM 28th …, 2020 - ieeexplore.ieee.org
Crowdsourcing is a promising computing paradigm that utilizes collective intelligence to
solve complex tasks. While it is valuable, traditional crowdsourcing systems lock …