Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Blockchain meets cloud computing: A survey

K Gai, J Guo, L Zhu, S Yu - IEEE Communications Surveys & …, 2020 - ieeexplore.ieee.org
Blockchain technology has been deemed to be an ideal choice for strengthening existing
computing systems in varied manners. As one of the network-enabled technologies, cloud …

Data security and privacy protection for cloud storage: A survey

P Yang, N **ong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems

S Wang, Y Zhang, Y Zhang - Ieee Access, 2018 - ieeexplore.ieee.org
In traditional cloud storage systems, attribute-based encryption (ABE) is regarded as an
important technology for solving the problem of data privacy and fine-grained access control …

Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain

A Zhang, X Lin - Journal of medical systems, 2018 - Springer
Electronic health record sharing can help to improve the accuracy of diagnosis, where
security and privacy preservation are critical issues in the systems. In recent years …

Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Efficient medical big data management with keyword-searchable encryption in healthchain

C Li, M Dong, J Li, G Xu, XB Chen, W Liu… - IEEE Systems …, 2022 - ieeexplore.ieee.org
Along with applying blockchain technology in the health care service system (HSS), many
distributed solutions have been proposed to solve the centralized, data island problems …

Security and privacy-preserving challenges of e-health solutions in cloud computing

S Chenthara, K Ahmed, H Wang, F Whittaker - IEEE access, 2019 - ieeexplore.ieee.org
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …

A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data

Z **a, X Wang, X Sun, Q Wang - IEEE transactions on parallel …, 2015 - ieeexplore.ieee.org
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …