Security and privacy issues of fog computing: A survey

S Yi, Z Qin, Q Li - Wireless Algorithms, Systems, and Applications: 10th …, 2015 - Springer
Fog computing is a promising computing paradigm that extends cloud computing to the
edge of networks. Similar to cloud computing but with distinct characteristics, fog computing …

Privacy-preserving multi-keyword ranked search over encrypted cloud data

N Cao, C Wang, M Li, K Ren… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
With the advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to the commercial public cloud for great flexibility …

Oruta: Privacy-preserving public auditing for shared data in the cloud

B Wang, B Li, H Li - IEEE transactions on cloud computing, 2014 - ieeexplore.ieee.org
With cloud data services, it is commonplace for data to be not only stored in the cloud, but
also shared across multiple users. Unfortunately, the integrity of cloud data is subject to …

Panda: Public auditing for shared data with efficient user revocation in the cloud

B Wang, B Li, H Li - IEEE Transactions on services computing, 2013 - ieeexplore.ieee.org
With data storage and sharing services in the cloud, users can easily modify and share data
as a group. To ensure shared data integrity can be verified publicly, users in the group need …

[HTML][HTML] Time to forge ahead: The Internet of Things for healthcare

D Furtado, AF Gygax, CA Chan, AI Bush - Digital Communications and …, 2023 - Elsevier
Situated at the intersection of technology and medicine, the Internet of Things (IoT) holds the
promise of addressing some of healthcare's most pressing challenges, from medical error, to …

Storing shared data on the cloud via security-mediator

B Wang, SSM Chow, M Li, H Li - 2013 IEEE 33rd International …, 2013 - ieeexplore.ieee.org
Nowadays, many organizations outsource data storage to the cloud such that a member
(owner) of an organization can easily share data with other members (users). Due to the …

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium

W Shen, J Yu, H Xia, H Zhang, X Lu, R Hao - Journal of Network and …, 2017 - Elsevier
To verify the integrity of cloud data, many cloud storage auditing schemes have been
proposed. However, most of them incur a lot of computation overhead for users when data …

Certificateless public auditing for data integrity in the cloud

B Wang, B Li, H Li, F Li - 2013 IEEE conference on …, 2013 - ieeexplore.ieee.org
Due to the existence of security threats in the cloud, many mechanisms have been proposed
to allow a user to audit data integrity with the public key of the data owner before utilizing …

Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud

J Liu, B Zhao, J Qin, X Hou, J Ma - Information Sciences, 2023 - Elsevier
Searchable encryption (SE) meets users' demand for the keyword search on encrypted data.
Key-aggregate searchable encryption (KASE) improves data owners' ability to selectively …

Measuring just noticeable differences for haptic force feedback: implications for rehabilitation

S Allin, Y Matsuoka, R Klatzky - Proceedings 10th Symposium …, 2002 - ieeexplore.ieee.org
Describes preliminary work in the use of a virtual environment to derive just noticeable
differences (JNDs) for force. Specifically, we look for thresholds of force sensitivity so that we …