A systematic review of homomorphic encryption and its contributions in healthcare industry

K Munjal, R Bhatia - Complex & Intelligent Systems, 2023‏ - Springer
Cloud computing and cloud storage have contributed to a big shift in data processing and its
use. Availability and accessibility of resources with the reduction of substantial work is one of …

A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018‏ - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022‏ - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

A survey on IoT security: application areas, security threats, and solution architectures

V Hassija, V Chamola, V Saxena, D Jain, P Goyal… - IEEe …, 2019‏ - ieeexplore.ieee.org
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018‏ - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Achieving privacy-preserving and verifiable support vector machine training in the cloud

C Hu, C Zhang, D Lei, T Wu, X Liu… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
With the proliferation of machine learning, the cloud server has been employed to collect
massive data and train machine learning models. Several privacy-preserving machine …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018‏ - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017‏ - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Security and privacy in smart health: Efficient policy-hiding attribute-based access control

Y Zhang, D Zheng, RH Deng - IEEE Internet of Things Journal, 2018‏ - ieeexplore.ieee.org
With the rapid development of the Internet of Things and cloud computing technologies,
smart health (s-health) is expected to significantly improve the quality of health care …

The security of big data in fog-enabled IoT applications including blockchain: A survey

N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi… - Sensors, 2019‏ - mdpi.com
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …