Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Mobile edge computing: A survey

N Abbas, Y Zhang, A Taherkordi… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Mobile edge computing (MEC) is an emergent architecture where cloud computing services
are extended to the edge of networks leveraging mobile base stations. As a promising edge …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data

Z **a, X Wang, X Sun, Q Wang - IEEE transactions on parallel …, 2015 - ieeexplore.ieee.org
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …

Security and privacy issues of fog computing: A survey

S Yi, Z Qin, Q Li - Wireless Algorithms, Systems, and Applications: 10th …, 2015 - Springer
Fog computing is a promising computing paradigm that extends cloud computing to the
edge of networks. Similar to cloud computing but with distinct characteristics, fog computing …

Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing

Z Fu, X Sun, Q Liu, L Zhou, J Shu - IEICE Transactions on …, 2015 - search.ieice.org
Cloud computing is becoming increasingly popular. A large number of data are outsourced
to the cloud by data owners motivated to access the large-scale computing resources and …

Privacy-preserving multi-keyword ranked search over encrypted cloud data

N Cao, C Wang, M Li, K Ren… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
With the advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to the commercial public cloud for great flexibility …

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking

W Sun, B Wang, N Cao, M Li, W Lou, YT Hou… - Proceedings of the 8th …, 2013 - dl.acm.org
With the increasing popularity of cloud computing, huge amount of documents are
outsourced to the cloud for reduced management cost and ease of access. Although …

Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

W Sun, S Yu, W Lou, YT Hou… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Search over encrypted data is a critically important enabling technique in cloud computing,
where encryption-before-outsourcing is a fundamental solution to protecting user data …