Securing critical user information over the internet of medical things platforms using a hybrid cryptography scheme

OC Abikoye, ET Oladipupo, AL Imoize, JB Awotunde… - Future Internet, 2023 - mdpi.com
The application of the Internet of Medical Things (IoMT) in medical systems has brought
much ease in discharging healthcare services by medical practitioners. However, the …

Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data

Z Fu, J Shu, X Sun, N Linge - IEEE Transactions on Consumer …, 2014 - ieeexplore.ieee.org
With the increasing popularity of the pay-as-you-consume cloud computing paradigm, a
large number of cloud services are pushed to consumers. One hand, it brings great …

[PDF][PDF] A fuzzy-based Solution for Optimized Management of Energy Consumption in e-bikes.

M Giliberto, F Arena, G Pau - J. Wirel. Mob. Networks Ubiquitous Comput …, 2019 - jowua.com
In recent years, electric vehicles (EVs) have performed an increasingly significant role in
contemporary smart cities. Among the various classes of EVs, it is reasonable to incorporate …

An experimental comparison of two risk-based security methods

K Labunets, F Massacci, F Paci - 2013 ACM/IEEE …, 2013 - ieeexplore.ieee.org
A significant number of methods have been proposed to identify and analyze threats and
security requirements, but there are few empirical evaluations that show these methods work …

New ciphertext-policy attribute-based access control with efficient revocation

X **e, H Ma, J Li, X Chen - … EurAsia 2013, Yogyakarta, Indonesia, March 25 …, 2013 - Springer
Abstract Attribute-Based Encryption (ABE) is one of the promising cryptographic primitives
for fine-grained access control of shared outsourced data in cloud computing. However …

Secure keyword search using dual encryption in cloud computing

H Tariq, P Agarwal - International Journal of Information Technology, 2020 - Springer
This paper manages the secure searching, stockpiling and recovery of client information in
the cloud framework. Different services of cloud, security issues and security necessities of …

Secure access control of e-health system with attribute-based encryption

H Yan, J Li, X Li, G Zhao, SY Lee… - Intelligent Automation & …, 2016 - Taylor & Francis
Cloud computing is a new paradigm, which provides low-cost and effective outsourced data
storage service. People are used to storing personal data in cloud server. E-Health system …

Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data

SA Mittal, CR Krishna - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Cloud Storage is currently one of the most widely used applications of cloud. As usage of
cloud is increasing, critical and personal data is also being outsourced making it important to …

An investigation study of privacy preserving in cloud computing environment

AM Manasrah, MA Shannaq, MA Nasir - Handbook of Computer Networks …, 2020 - Springer
Cloud computing allows users with limited resources to farm out their data to the cloud for
computation, bandwidth, storage, and services on a pay-per-use basis. Consequently …

An efficient search method using features to match joint keywords on encrypted cloud data

L Tao, H Xu, Y Shu, Z Tie - IEEE Access, 2022 - ieeexplore.ieee.org
With the continuous improvement of the security of cloud storage, more users upload private
data to the cloud. However, a large number of encrypted data using independent keywords …