Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Mobile edge computing: A survey
Mobile edge computing (MEC) is an emergent architecture where cloud computing services
are extended to the edge of networks leveraging mobile base stations. As a promising edge …
are extended to the edge of networks leveraging mobile base stations. As a promising edge …
Data security and privacy-preserving in edge computing paradigm: Survey and open issues
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …
edge of the network, the traditional centralized cloud computing model has come to a …
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
Security and privacy issues of fog computing: A survey
Fog computing is a promising computing paradigm that extends cloud computing to the
edge of networks. Similar to cloud computing but with distinct characteristics, fog computing …
edge of networks. Similar to cloud computing but with distinct characteristics, fog computing …
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
Cloud computing is becoming increasingly popular. A large number of data are outsourced
to the cloud by data owners motivated to access the large-scale computing resources and …
to the cloud by data owners motivated to access the large-scale computing resources and …
Privacy-preserving multi-keyword ranked search over encrypted cloud data
With the advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to the commercial public cloud for great flexibility …
data management systems from local sites to the commercial public cloud for great flexibility …
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
With the increasing popularity of cloud computing, huge amount of documents are
outsourced to the cloud for reduced management cost and ease of access. Although …
outsourced to the cloud for reduced management cost and ease of access. Although …
Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
Search over encrypted data is a critically important enabling technique in cloud computing,
where encryption-before-outsourcing is a fundamental solution to protecting user data …
where encryption-before-outsourcing is a fundamental solution to protecting user data …