Securing critical user information over the internet of medical things platforms using a hybrid cryptography scheme
The application of the Internet of Medical Things (IoMT) in medical systems has brought
much ease in discharging healthcare services by medical practitioners. However, the …
much ease in discharging healthcare services by medical practitioners. However, the …
Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data
With the increasing popularity of the pay-as-you-consume cloud computing paradigm, a
large number of cloud services are pushed to consumers. One hand, it brings great …
large number of cloud services are pushed to consumers. One hand, it brings great …
[PDF][PDF] A fuzzy-based Solution for Optimized Management of Energy Consumption in e-bikes.
In recent years, electric vehicles (EVs) have performed an increasingly significant role in
contemporary smart cities. Among the various classes of EVs, it is reasonable to incorporate …
contemporary smart cities. Among the various classes of EVs, it is reasonable to incorporate …
An experimental comparison of two risk-based security methods
A significant number of methods have been proposed to identify and analyze threats and
security requirements, but there are few empirical evaluations that show these methods work …
security requirements, but there are few empirical evaluations that show these methods work …
New ciphertext-policy attribute-based access control with efficient revocation
Abstract Attribute-Based Encryption (ABE) is one of the promising cryptographic primitives
for fine-grained access control of shared outsourced data in cloud computing. However …
for fine-grained access control of shared outsourced data in cloud computing. However …
Secure keyword search using dual encryption in cloud computing
H Tariq, P Agarwal - International Journal of Information Technology, 2020 - Springer
This paper manages the secure searching, stockpiling and recovery of client information in
the cloud framework. Different services of cloud, security issues and security necessities of …
the cloud framework. Different services of cloud, security issues and security necessities of …
Secure access control of e-health system with attribute-based encryption
Cloud computing is a new paradigm, which provides low-cost and effective outsourced data
storage service. People are used to storing personal data in cloud server. E-Health system …
storage service. People are used to storing personal data in cloud server. E-Health system …
Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data
SA Mittal, CR Krishna - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Cloud Storage is currently one of the most widely used applications of cloud. As usage of
cloud is increasing, critical and personal data is also being outsourced making it important to …
cloud is increasing, critical and personal data is also being outsourced making it important to …
An investigation study of privacy preserving in cloud computing environment
Cloud computing allows users with limited resources to farm out their data to the cloud for
computation, bandwidth, storage, and services on a pay-per-use basis. Consequently …
computation, bandwidth, storage, and services on a pay-per-use basis. Consequently …
An efficient search method using features to match joint keywords on encrypted cloud data
L Tao, H Xu, Y Shu, Z Tie - IEEE Access, 2022 - ieeexplore.ieee.org
With the continuous improvement of the security of cloud storage, more users upload private
data to the cloud. However, a large number of encrypted data using independent keywords …
data to the cloud. However, a large number of encrypted data using independent keywords …