Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
Data security and privacy-preserving in edge computing paradigm: Survey and open issues
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …
edge of the network, the traditional centralized cloud computing model has come to a …
RETRACTED ARTICLE: Securing e-health records using keyless signature infrastructure blockchain technology in the cloud
G Nagasubramanian, RK Sakthivel, R Patan… - Neural Computing and …, 2020 - Springer
Health record maintenance and sharing are one of the essential tasks in the healthcare
system. In this system, loss of confidentiality leads to a passive impact on the security of …
system. In this system, loss of confidentiality leads to a passive impact on the security of …
Multi-access edge computing architecture, data security and privacy: A review
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …
provide computation, storage, and networking capabilities at the edge of the network in …
A review on internet of things for defense and public safety
The Internet of Things (IoT) is undeniably transforming the way that organizations
communicate and organize everyday businesses and industrial procedures. Its adoption has …
communicate and organize everyday businesses and industrial procedures. Its adoption has …
Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …
are adopting the cloud environment due to the least upfront capital investment, maximum …
MedShare: A privacy-preserving medical data sharing system by using blockchain
Electronic Health Record (EHR) and its privacy have attracted widespread attention with the
development of the healthcare industry in recent years. As locking medical data in a single …
development of the healthcare industry in recent years. As locking medical data in a single …
CryptoGA: a cryptosystem based on genetic algorithm for cloud data security
Cloud Computing is referred to as a set of hardware and software that are being combined
to deliver various services of computing. The cloud keeps the services for delivery of …
to deliver various services of computing. The cloud keeps the services for delivery of …
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption
Abstract The development of Electronic Information Technology has made the Electronic
Medical Record a commonly used approach to recording and categorizing medical patient …
Medical Record a commonly used approach to recording and categorizing medical patient …