Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …

Blockchain-based public integrity verification for cloud storage against procrastinating auditors

Y Zhang, C Xu, X Lin, X Shen - IEEE Transactions on Cloud …, 2019 - ieeexplore.ieee.org
The deployment of cloud storage services has significant benefits in managing data for
users. However, it also causes many security concerns, and one of them is data integrity …

An efficient public auditing protocol with novel dynamic structure for cloud data

J Shen, J Shen, X Chen, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the rapid development of cloud computing, cloud storage has been accepted by an
increasing number of organizations and individuals, therein serving as a convenient and on …

Block design-based key agreement for group data sharing in cloud computing

J Shen, T Zhou, D He, Y Zhang, X Sun… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang - Journal of Network and …, 2018 - Elsevier
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …

A lightweight multi-layer authentication protocol for wireless body area networks

J Shen, S Chang, J Shen, Q Liu, X Sun - Future generation computer …, 2018 - Elsevier
Nowadays, the technology of Internet of Things (IoT) is getting more and more important
which brings a lot of convenience to people's life and city's development. As a key …

Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries

D He, N Kumar, S Zeadally, A Vinel… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Privacy-preserving data aggregation (P2DA) is an important basic building block that can
protect consumer's privacy in the smart grid environment because it could be used to …

Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain

S Son, J Lee, M Kim, S Yu, AK Das, Y Park - IEEE Access, 2020 - ieeexplore.ieee.org
Telecare medical information system (TMIS) implemented in wireless body area network
(WBAN) is convenient and time-saving for patients and doctors. TMIS is realized using …