Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute‐Based Encryption

X Yang, A Chen, Z Wang, S Li - Security and Communication …, 2022 - Wiley Online Library
Cloud storage is a popular model of the application in various fields, and the security of
storage data and access permission have been widely considered. Attribute‐based …

Public Key Encryption with Authorized Equality Test on Outsourced Ciphertexts for Cloud‐Assisted IoT in Dual Server Model

M Zhao, Y Ding, S Tang, H Liang… - … and Mobile Computing, 2022 - Wiley Online Library
In cloud computing, the outsourced data face many privacy and security threats. To allow the
cloud server to perform comparison, search, and classification on outsourced ciphertexts …

Implementation of Secure and Verifiable Access Control Procedures using the NTRU Cryptosystem to Store Big Data in the Cloud Environment

R Babu B, S Saxena, G Widjaja… - Recent Patents on …, 2025 - benthamdirect.com
Background Due to their complexity and size, deploying ciphertexts for clouds is considered
the most useful approach to accessing large data stores. Methods However, access to a …

Design of Cloud Storage‐Oriented Sports Physical Fitness Monitoring System

Z Zheng, Y Liu - Computational intelligence and neuroscience, 2022 - Wiley Online Library
In order to improve the accuracy and response speed of sports fitness monitoring results and
make the monitoring results more comprehensive, a new cloud storage‐oriented sports …

A secret and traceable approach for cloud data sharing

C Xu, Y Yin, Y Chen - … Conference on Cyber Security and Cloud …, 2023 - ieeexplore.ieee.org
With the development of cloud computing, data owners generally use cloud services to
reduce storage and computing overhead. However, data stored in cloud servers is out of the …

Provable Cloud Data Transfer with Efficient Integrity Auditing for Cloud Computing

C Yang, J **ao, Y Liu, Y Liu - Wireless Communications and …, 2022 - Wiley Online Library
Due to the promising market prospects, more and more enterprises invest cloud storage and
offer on‐demand data storage services, which are characterized by distinct quality; thus …

Modeling Data Sovereignty in Public Cloud—A Comparison of Existing Solutions.

S Galij, G Pawlak, S Grzyb - Applied Sciences (2076-3417), 2024 - search.ebscohost.com
Data sovereignty has emerged as a critical concern for enterprises, cloud service providers
(hyperscalers), end-users, and policymakers at both national and international levels. In …

[PDF][PDF] Cloud Infrastructure and Enterprise IT Environment

E Adeoye, B Osibo - International Journal of Latest Technology in …, 2023 - researchgate.net
Cloud infrastructure has emerged as a game-changer for the enterprise IT environment in
Nigeria. As the country's businesses continue to grow and adapt to the digital era, cloud …

Edge computing technology engineering analysis

S Kovalenko, L Kazantseva… - American Institute of …, 2023 - ui.adsabs.harvard.edu
The paper analyzes the problems arising in edge computing technology. A mathematical
model describing the time delays in data processing and transmission is constructed, and …

Big Data Sports Fitness Detection based on Cloud Storage-Oriented Data System

J Xu - 2023 - researchsquare.com
Nowadays, there are more and more motor vehicles in cities, and with the deteriorating
world environment and depletion of resources, low-carbon travel has become a new trend …