Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Blockchain meets cloud computing: A survey
Blockchain technology has been deemed to be an ideal choice for strengthening existing
computing systems in varied manners. As one of the network-enabled technologies, cloud …
computing systems in varied manners. As one of the network-enabled technologies, cloud …
Data security and privacy protection for cloud storage: A survey
P Yang, N **ong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …
transformation and world's digital economy are at the top of the tide. The continuous growth …
A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems
S Wang, Y Zhang, Y Zhang - Ieee Access, 2018 - ieeexplore.ieee.org
In traditional cloud storage systems, attribute-based encryption (ABE) is regarded as an
important technology for solving the problem of data privacy and fine-grained access control …
important technology for solving the problem of data privacy and fine-grained access control …
Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain
Electronic health record sharing can help to improve the accuracy of diagnosis, where
security and privacy preservation are critical issues in the systems. In recent years …
security and privacy preservation are critical issues in the systems. In recent years …
Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
Data security and privacy-preserving in edge computing paradigm: Survey and open issues
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …
edge of the network, the traditional centralized cloud computing model has come to a …
Efficient medical big data management with keyword-searchable encryption in healthchain
Along with applying blockchain technology in the health care service system (HSS), many
distributed solutions have been proposed to solve the centralized, data island problems …
distributed solutions have been proposed to solve the centralized, data island problems …
Security and privacy-preserving challenges of e-health solutions in cloud computing
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …
health solutions indicates various privacy preserving approaches to ensure privacy and …
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
motivated to outsource their data to cloud servers for great convenience and reduced cost in …