Data leakage in electronic health records (EHRs) could result in the compromise of patient privacy (eg medical conditions). Generally most data in EHRs remain unchanged once they …
J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a …
Privacy and security are the most important issues to the popularity of cloud computing service. In recent years, there are many research schemes of cloud computing privacy …
Searchable Encryption (SE) is an important technique to guarantee data security and usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
Q Liu, Y Tian, J Wu, T Peng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud computing as a promising computing paradigm is increasingly utilized as potential hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' …
X Gao, J Yu, Y Chang, H Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The public cloud data integrity auditing technique is used to check the integrity of cloud data through the Third Party Auditor (TPA). In order to make it more practical, we propose a new …
X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Verifiable Searchable Symmetric Encryption, as an important cloud security technique, allows users to retrieve the encrypted data from the cloud through keywords and verify the …
With the emergence of cloud computing, data owners are showing interest to outsource the data to the cloud servers and allowing the data users to access the data as and when …