[HTML][HTML] The rise of cloud computing: data protection, privacy, and open research challenges—a systematic literature review (SLR)

J Hassan, D Shehzad, U Habib, MU Aftab… - Computational …, 2022 - hindawi.com
Cloud computing is a long-standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on-demand services and high-quality applications …

DeepFakE: improving fake news detection using tensor decomposition-based deep neural network

RK Kaliyar, A Goswami, P Narang - The Journal of Supercomputing, 2021 - Springer
Social media platforms have simplified the sharing of information, which includes news as
well, as compared to traditional ways. The ease of access and sharing the data with the …

Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage

Y Zhang, C Xu, J Ni, H Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud storage enables users to outsource data to storage servers and retrieve target data
efficiently. Some of the outsourced data are very sensitive and should be prevented for any …

A privacy-preserving and untraceable group data sharing scheme in cloud computing

J Shen, H Yang, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the development of cloud computing, the great amount of storage data requires safe
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption

D Unal, A Al-Ali, FO Catak, M Hammoudeh - Future Generation Computer …, 2021 - Elsevier
Data security is a challenge for end-users of cloud services as the users have no control
over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider …

Public-key authenticated encryption with keyword search: Cryptanalysis, enhanced security, and quantum-resistant instantiation

ZY Liu, YF Tseng, R Tso, M Mambo… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
With the rapid development of cloud computing, an increasing number of companies are
adopting cloud storage technology to reduce overhead. However, to ensure the privacy of …

CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors

X Zhang, J Zhao, C Xu, H Li, H Wang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Wireless body area networks (WBANs) rely on powerful cloud storage services to manage
massive medical data. As precise medical diagnosis analysis is heavily based on these …

FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice

X Yang, X Chen, J Huang, H Li, Q Huang - Computer Standards & …, 2023 - Elsevier
Abstract Public Key Encryption with Keyword Search (PEKS) makes it possible for a cloud
server (CS) to match a trapdoor and a ciphertext. However, with the upgrowth of quantum …

A survey of public-key encryption with search functionality for cloud-assisted IoT

H Xiong, T Yao, H Wang, J Feng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …