Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Security and privacy-preserving challenges of e-health solutions in cloud computing

S Chenthara, K Ahmed, H Wang, F Whittaker - IEEE access, 2019 - ieeexplore.ieee.org
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …

Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain

A Zhang, X Lin - Journal of medical systems, 2018 - Springer
Electronic health record sharing can help to improve the accuracy of diagnosis, where
security and privacy preservation are critical issues in the systems. In recent years …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search

H Li, Q Huang, J Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …

Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds

Y Yang, M Ma - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
An electronic health (e-health) record system is a novel application that will bring great
convenience in healthcare. The privacy and security of the sensitive personal information …

Public-key authenticated encryption with keyword search revisited: Security model and constructions

B Qin, Y Chen, Q Huang, X Liu, D Zheng - Information Sciences, 2020 - Elsevier
In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the
interesting and challenging problem of searching on encrypted data. However, previous …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

L Fang, W Susilo, C Ge, J Wang - Information sciences, 2013 - Elsevier
The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et
al. to enable a server to search from a collection of encrypted emails given a “trapdoor”(ie …

[PDF][PDF] 边缘计算数据安全与隐私保护研究综述

张佳乐, 赵彦超, 陈兵, 胡峰… - Journal on …, 2018 - infocomm-journal.com
随着物联网, 大数据和5G 网络的快速发展和广泛应用, 传统的云计算无法处理网络边缘设备所
产生的海量数据, 因此, 边缘计算应运而生. 然而, 由于边缘计算的内容感知, 实时计算 …