Y Liu, H Peng, J Wang - Computers, Materials & Continua, 2018 - cdn.techscience.cn
Data outsourcing has become an important application of cloud computing. Driven by the growing security demands of data outsourcing applications, sensitive data have to be …
P Yang, H Li, J Huang, H Zhang, MHA Au… - Future Generation …, 2023 - Elsevier
A significant amount of electronic health records (EHRs) have been kept in the cloud due to the quick development of healthcare information systems. However, storing EHRs in the …
R Handa, CR Krishna… - … and Computation: Practice …, 2019 - Wiley Online Library
Outsourcing confidential data to cloud storage leads to privacy challenges that can be reduced using encryption. However, with encryption in place, the utilization of the data is …
Y Miao, J Ma, X Liu, Z Liu, L Shen, F Wei - Peer-to-peer Networking and …, 2018 - Springer
The advantages of cloud computing encourage individuals and enterprises to outsource their local data storage and computation to cloud server, however, data security and privacy …
Y Miao, J Ma, Q Jiang, X Li, AK Sangaiah - Computers & Electrical …, 2018 - Elsevier
In smart city, which integrates the Information and Communication Technologies (ICT) including cloud computing and internet of things, all kinds of data collected by smart devices …
Y Zhang, Y Wang, Y Li - IEEE Access, 2019 - ieeexplore.ieee.org
Searchable public key encryption (SPE) that supports multi-keywords search, allows data users to retrieve encrypted files of interest efficiently, and thus it has been intensively studied …
J Shao, R Lu, Y Guan, G Wei - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
Due to the high demands of searchability over encrypted data, searchable encryption (SE) has recently received considerable attention and been widely suggested in encrypted cloud …
J Shen, C Wang, A Wang, S Ji… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Scientific research achievements play a positive role in the promotion of social development. Scholarly big data include scholars' scientific research, experimental data, and their own …
X Zhang, C Xu, L Mu, J Zhao - China Communications, 2018 - ieeexplore.ieee.org
Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any information …