C Cai, X Yuan, C Wang - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
Emerging decentralized storage services such as Storj and Filecoin show promise as a new paradigm for data outsourcing. These services tie cryptocurrency to personal storage …
Recent research has demonstrated searchable blockchains that not only provide reliable search over encrypted distributed storage systems but ensure privacy is preserved. Yet …
Blockchain has led the trend of decentralized applications and shown great use beyond cryptocurrencies. Decentralized storage such as Storj and Sia leverages blockchain to …
As a very attractive computing paradigm, cloud computing makes it possible for resource- constrained users to enjoy cost-effective and flexible resources of diversity. Considering the …
HG Do, WK Ng - 2017 IEEE World Congress on Services …, 2017 - ieeexplore.ieee.org
Traditional cloud storage has relied almost exclusively on large storage providers, who act as trusted third parties to transfer and store data. This model poses a number of issues …
Q Wu, T Lai, L Zhang, Y Mu, F Rezaeibagha - Journal of Systems …, 2022 - Elsevier
With the arrival of the 5G era, fast and secure data sharing is attracting increased attention. Among of the presented solutions, keyword search plays an important role since it can …
C Huang, D Liu, A Yang, R Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we propose a multi-client secure and efficient keyword search scheme for cloud storage, which is built upon distributed point function (DPF). Specifically, outsourced …
H Li, Y Yang, TH Luan, X Liang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the cloud servers. As the outsourced data are likely to contain …
Y Zhang, C Xu, J Ni, H Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any …