Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Efficient medical big data management with keyword-searchable encryption in healthchain

C Li, M Dong, J Li, G Xu, XB Chen, W Liu… - IEEE Systems …, 2022 - ieeexplore.ieee.org
Along with applying blockchain technology in the health care service system (HSS), many
distributed solutions have been proposed to solve the centralized, data island problems …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

A secure data sharing platform using blockchain and interplanetary file system

M Naz, FA Al-zahrani, R Khalid, N Javaid, AM Qamar… - Sustainability, 2019 - mdpi.com
In a research community, data sharing is an essential step to gain maximum knowledge from
the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to …

Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system

Y Yang, X Zheng, W Guo, X Liu, V Chang - Information Sciences, 2019 - Elsevier
In this paper, a privacy-preserving smart IoT-based healthcare big data storage system with
self-adaptive access control is proposed. The aim is to ensure the security of patients' …

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

Q Huang, H Li - Information Sciences, 2017 - Elsevier
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …

Certificateless public key authenticated encryption with keyword search for industrial internet of things

D He, M Ma, S Zeadally, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile
devices, and communication technologies to enable the upgrade of traditional industries to …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Privacy-preserving attribute-based keyword search in shared multi-owner setting

Y Miao, X Liu, KKR Choo, RH Deng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …