Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J **a… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J **a, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

A flexible privacy-preserving data sharing scheme in cloud-assisted IoT

H Deng, Z Qin, L Sha, H Yin - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) has become an increasingly popular technological
trend as the performance of IoT applications can be greatly improved by delegating the …

A threshold proxy re-encryption scheme for secure IoT data sharing based on blockchain

Y Chen, B Hu, H Yu, Z Duan, J Huang - Electronics, 2021 - mdpi.com
The IoT devices deployed in various application scenarios will generate massive data with
immeasurable value every day. These data often contain the user's personal privacy …

[PDF][PDF] Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage.

Z Deng, Y Ren, Y Liu, X Yin, Z Shen… - Computers, Materials & …, 2019 - cdn.techscience.cn
Cloud storage represents the trend of intensive, scale and specialization of information
technology, which has changed the technical architecture and implementation method of …

Flexible selective data sharing with fine-grained erasure in VANETs

H Liu, Y Ming, C Wang, Y Zhao - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs), an increasingly significant technology in intelligent
transportation systems, achieve information sharing, intelligent traffic flow control, and road …

An identity-based proxy re-encryption scheme with single-hop conditional delegation and multi-hop ciphertext evolution for secure cloud data sharing

S Yao, RVJ Dayot, IH Ra, L Xu, Z Mei… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Proxy re-encryption (PRE) provides a promising solution for applications requiring efficient
and secure ciphertext conversion, such as secure cloud data sharing. While the one with the …

A privacy preserve big data analysis system for wearable wireless sensor network

C Ge, C Yin, Z Liu, L Fang, J Zhu, H Ling - Computers & Security, 2020 - Elsevier
Big data and artificial intelligence develop rapidly. Big data analysis has been applied in
many fields of smart healthcare. Once these data are leaked or modified during …

Distributed group key management for event notification confidentiality among sensors

C Esposito, M Ficco, A Castiglione… - … on Dependable and …, 2018 - ieeexplore.ieee.org
There is an increasing involvement of the Internet of Things (IoT) in many of our daily
activities, with the aim of improving their efficiency and effectiveness. We are witnessing the …

Policy-based broadcast access authorization for flexible data sharing in clouds

H Deng, J Zhang, Z Qin, Q Wu, H Yin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cloud storage services allow data owners to outsource their potentially sensitive data (eg,
private genome data) to remote cloud servers in a ciphertext form. To enable data owners to …