Searchable encryption for healthcare clouds: A survey

R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …

Blockchain based searchable encryption for electronic health record sharing

L Chen, WK Lee, CC Chang, KKR Choo… - Future generation …, 2019 - Elsevier
Data leakage in electronic health records (EHRs) could result in the compromise of patient
privacy (eg medical conditions). Generally most data in EHRs remain unchanged once they …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

Enabling verifiable and dynamic ranked search over outsourced data

Q Liu, Y Tian, J Wu, T Peng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud computing as a promising computing paradigm is increasingly utilized as potential
hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' …

[PDF][PDF] 边缘计算数据安全与隐私保护研究综述

张佳乐, 赵彦超, 陈兵, 胡峰… - Journal on …, 2018 - infocomm-journal.com
随着物联网, 大数据和5G 网络的快速发展和广泛应用, 传统的云计算无法处理网络边缘设备所
产生的海量数据, 因此, 边缘计算应运而生. 然而, 由于边缘计算的内容感知, 实时计算 …

Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data

X Gao, J Yu, Y Chang, H Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The public cloud data integrity auditing technique is used to check the integrity of cloud data
through the Third Party Auditor (TPA). In order to make it more practical, we propose a new …

Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification

X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Verifiable Searchable Symmetric Encryption, as an important cloud security technique,
allows users to retrieve the encrypted data from the cloud through keywords and verify the …

A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments

U Varri, S Pasupuleti, KV Kadambari - The Journal of Supercomputing, 2020 - Springer
With the emergence of cloud computing, data owners are showing interest to outsource the
data to the cloud servers and allowing the data users to access the data as and when …