Secure document sharing model based on blockchain technology and attribute-based encryption

G Verma, S Kanrar - Multimedia Tools and Applications, 2024 - Springer
Various cryptographic approaches have been used to resolve concerns about data privacy
shared in public cloud storage, assuming that the cloud service provider is trustworthy …

Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

L Yan, L Ge, Z Wang, G Zhang, J Xu, Z Hu - Journal of Cloud Computing, 2023 - Springer
With the rapid development of cloud computing technology, how to achieve secure access to
cloud data has become a current research hotspot. Attribute-based encryption technology …

FedMUP: Federated learning driven malicious user prediction model for secure data distribution in cloud environments

K Gupta, D Saxena, R Gupta, J Kumar, AK Singh - Applied Soft Computing, 2024 - Elsevier
Cloud computing is flourishing at a rapid pace. Significant consequences related to data
security appear as a malicious user may get unauthorized access to sensitive data which …

[HTML][HTML] Dynamic forward secure searchable encryption scheme with phrase search for smart healthcare

X Yan, C Zheng, Y Tang, Y Huo, M Jin - Journal of Systems Architecture, 2023 - Elsevier
The phrase searchable encryption scheme improves search efficiency and accuracy by
searching a set of consecutive keywords from ciphertext. However, most current phrase …

MAIDS: malicious agent identification-based data security model for cloud environments

K Gupta, D Saxena, R Gupta, AK Singh - Cluster Computing, 2024 - Springer
With the vigorous development of cloud computing, most organizations have shifted their
data and applications to the cloud environment for storage, computation, and sharing …

A blockchain-based secure data sharing scheme with efficient attribute revocation

S Li, K Niu, B Wu - Journal of Systems Architecture, 2025 - Elsevier
With the growth of interdisciplinary projects, cooperation among organizations and secure
file sharing are increasingly crucial. The lead party manages these files and must ensure …

Secure monitoring system for industrial internet of things using searchable encryption, access control and machine learning

JB Aljabri - 2023 - theses.gla.ac.uk
This thesis is an alternative format submission comprising a set of publications and a
comprehensive literature review, an introduction, and a conclusion. Continuous compliance …

HCEC: An efficient geo-distributed deep learning training strategy based on wait-free back-propagation

Y Song, Y Ai, X Xiao, Z Liu, Z Tang, K Li - Journal of Systems Architecture, 2024 - Elsevier
Valuable data is often distributed across multiple data centers (DCs). Deep learning (DL)
tasks, constrained by privacy regulations, utilize local training and model averaging to …

Blockchain-based privacy-preserving public key searchable encryption with strong traceability

Y Han, J Han, W Meng, J Lai, G Wu - Journal of Systems Architecture, 2024 - Elsevier
Abstract Public Key Searchable Encryption (PKSE) has essential applications in cloud
storage because it allows users to search over encrypted data. To identify illegal users …

Fedmup: Federated Learning Driven Malicious User Prediction Model for Secure Data Distribution in Cloud Environments

D Saxena, K Gupta, R Gupta, J Kumar… - Available at SSRN … - papers.ssrn.com
Cloud computing is flourishing at a rapid pace. Significant consequences related to data
security appear as a malicious user may get unauthorized access to sensitive data which …