Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
Secure data encryption based on quantum walks for 5G Internet of Things scenario
Fifth generation (5G) networks are the base communication technology for connecting
objects in the Internet of Things (IoT) environment. 5G is being developed to provide …
objects in the Internet of Things (IoT) environment. 5G is being developed to provide …
Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …
are adopting the cloud environment due to the least upfront capital investment, maximum …
Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid
With the advent of the Industry 4.0 era, the development of smart cities based on the Internet
of Things (IoT) has reached a new level. As a key component of the Internet of Things (IoT) …
of Things (IoT) has reached a new level. As a key component of the Internet of Things (IoT) …
K-Time Modifiable and Epoch-Based Redactable Blockchain
As an immutable append-only distributed ledger, blockchain allows a group of participants
to reach a consensus in an untrustworthy ecosystem. Immutability is a blockchain feature …
to reach a consensus in an untrustworthy ecosystem. Immutability is a blockchain feature …
MLPAM: A machine learning and probabilistic analysis based model for preserving security and privacy in cloud environment
The organizational valuable data needs to be shared with multiple parties and stakeholders
in a cloud environment for storage, analysis, and data utilization. However, to ensure the …
in a cloud environment for storage, analysis, and data utilization. However, to ensure the …
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to
provide a variety of on-demand data services via the edge network. Many cryptographic …
provide a variety of on-demand data services via the edge network. Many cryptographic …
A survey on redactable blockchain: challenges and opportunities
While immutability is an important property of blockchain and can be utilized to build a
credible data publishing platform, the same property can also be abused to disseminate …
credible data publishing platform, the same property can also be abused to disseminate …
Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving
data confidentiality securely. Many SE solutions have been designed to improve efficiency …
data confidentiality securely. Many SE solutions have been designed to improve efficiency …