The rise of “big data” on cloud computing: Review and open research issues

IAT Hashem, I Yaqoob, NB Anuar, S Mokhtar, A Gani… - Information systems, 2015 - Elsevier
Cloud computing is a powerful technology to perform massive-scale and complex
computing. It eliminates the need to maintain expensive computing hardware, dedicated …

A survey of fog computing: concepts, applications and issues

S Yi, C Li, Q Li - Proceedings of the 2015 workshop on mobile big data, 2015 - dl.acm.org
Despite the increasing usage of cloud computing, there are still issues unsolved due to
inherent problems of cloud computing such as unreliable latency, lack of mobility support …

A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data

Z **a, X Wang, X Sun, Q Wang - IEEE transactions on parallel …, 2015 - ieeexplore.ieee.org
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …

Blockchain based searchable encryption for electronic health record sharing

L Chen, WK Lee, CC Chang, KKR Choo… - Future generation …, 2019 - Elsevier
Data leakage in electronic health records (EHRs) could result in the compromise of patient
privacy (eg medical conditions). Generally most data in EHRs remain unchanged once they …

Data security and privacy protection for cloud storage: A survey

P Yang, N **ong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

Enabling personalized search over encrypted outsourced data with efficiency improvement

Z Fu, K Ren, J Shu, X Sun… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
In cloud computing, searchable encryption scheme over outsourced data is a hot research
field. However, most existing works on encrypted search over outsourced cloud data follow …

A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing

Z **a, X Wang, L Zhang, Z Qin, X Sun… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Security and privacy issues of fog computing: A survey

S Yi, Z Qin, Q Li - Wireless Algorithms, Systems, and Applications: 10th …, 2015 - Springer
Fog computing is a promising computing paradigm that extends cloud computing to the
edge of networks. Similar to cloud computing but with distinct characteristics, fog computing …