Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

A survey on energy internet: Architecture, approach, and emerging technologies

K Wang, J Yu, Y Yu, Y Qian, D Zeng, S Guo… - IEEE systems …, 2017 - ieeexplore.ieee.org
Energy crisis and carbon emission have become two seriously concerned issues
universally. As a feasible solution, Energy Internet (EI) has aroused global concern once …

A federated graph neural network framework for privacy-preserving personalization

C Wu, F Wu, L Lyu, T Qi, Y Huang, X **e - Nature Communications, 2022 - nature.com
Graph neural network (GNN) is effective in modeling high-order interactions and has been
widely used in various personalized applications such as recommendation. However …

Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks

K Zhang, Y Mao, S Leng, Q Zhao, L Li, X Peng… - IEEE …, 2016 - ieeexplore.ieee.org
Mobile edge computing (MEC) is a promising paradigm to provide cloud-computing
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …

Moth search algorithm: a bio-inspired metaheuristic algorithm for global optimization problems

GG Wang - Memetic Computing, 2018 - Springer
Phototaxis, signifying movement of an organism towards or away from a source of light, is
one of the most representative features for moths. It has recently been shown that one of the …

Security, privacy & efficiency of sustainable cloud computing for big data & IoT

C Stergiou, KE Psannis, BB Gupta… - … Computing: Informatics and …, 2018 - Elsevier
With the significant advances in communication technologies and in many other sectors,
also are growing up security and privacy issues. In our research, is introduced a base …

Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement

Z Fu, X Wu, C Guan, X Sun… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …

A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing

Z **a, X Wang, L Zhang, Z Qin, X Sun… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …

An efficient public auditing protocol with novel dynamic structure for cloud data

J Shen, J Shen, X Chen, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the rapid development of cloud computing, cloud storage has been accepted by an
increasing number of organizations and individuals, therein serving as a convenient and on …

Privacy-preserving outsourced classification in cloud computing

P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen - Cluster Computing, 2018 - Springer
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …