AI-Enhanced Cloud-Edge-Terminal Collaborative Network: Survey, Applications, and Future Directions

H Gu, L Zhao, Z Han, G Zheng… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The cloud-edge-terminal collaborative network (CETCN) is considered as a novel paradigm
for emerging applications owing to its huge potential in providing low-latency and ultra …

Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain

S Gao, G Piao, J Zhu, X Ma, J Ma - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access
control to achieve the secure data sharing. However, most of the existing CP-ABE access …

Analysis of security and privacy issues of information management of big data in B2B based healthcare systems

BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …

Secure and lightweight fine-grained searchable data sharing for IoT-oriented and cloud-assisted smart healthcare system

Y Bao, W Qiu, X Cheng - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
It is a new trend in healthcare informatization construction to build the smart healthcare
system by using the Internet of Things (IoT) and cloud. This IoT-oriented and cloud-assisted …

Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical IoT system

Y Bao, W Qiu, P Tang, X Cheng - IEEE Journal of Biomedical …, 2021 - ieeexplore.ieee.org
The cloud-assisted medical Internet of Things (MIoT) has played a revolutionary role in
promoting the quality of public medical services. However, the practical deployment of cloud …

EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination

J Liu, Y Li, R Sun, Q Pei, N Zhang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Cloud storage and edge computing provide the possibility to address the tremendous
storage and computing pressure caused by the explosive growth of traffic at the edge of the …

Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing

Y Zou, T Peng, G Wang, E Luo, J **ong - Journal of Systems Architecture, 2023 - Elsevier
Cloud-based data sharing has become a significant technology trend thanks for its
convenience and economy. Data owners are suggested to encrypt data before outsourcing …

Lattice-based public key searchable encryption with fine-grained access control for edge computing

P Wang, B Chen, T **ang, Z Wang - Future Generation Computer Systems, 2022 - Elsevier
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices,
edge computing provides various on-demand data services to reduce latency and network …

Blockchain-enabled fine-grained searchable encryption with cloud–edge computing for electronic health records sharing

H Gao, H Huang, L Xue, F **ao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The integration of Internet of Things (IoT) with cloud–edge computing in cyber–physical
systems has revolutionized the way healthcare enterprises manage electronic health …

Subversion-resistant and consistent attribute-based keyword search for secure cloud storage

K Zhang, Z Jiang, J Ning… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Secure cloud search service allows resource-constrained clients to effectively search over
encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion …