Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks

A Lohachab, A Lohachab, A Jangra - Internet of Things, 2020 - Elsevier
Abstract Internet of Things (IoT) ideates smart and inter-connected things capable of sharing
their perceptions through the Internet. These devices are different from conventional Internet …

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

Q Zhao, S Chen, Z Liu, T Baker, Y Zhang - Information Processing & …, 2020 - Elsevier
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …

Towards public verifiable and forward-privacy encrypted search by using blockchain

Y Guo, C Zhang, C Wang, X Jia - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) is a practical cryptographic primitive that
assists servers to provide search and update functionalities in the ciphertext domain. Recent …

An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things

J Zhang, Y Yang, X Liu, J Ma - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
With the assistance of the Internet of Things, the fast develo** Healthcare Internet of
Things (H-IoT) has promoted the healthcare ecosystem into the era of Health 5.0 and …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks

B Chen, L Wu, H Wang, L Zhou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the integration of the Internet of Vehicles and social networks, vehicular social networks
(VSN) not only improves the efficiency and reliability of vehicular communication …

Secure dynamic searchable symmetric encryption with constant client storage cost

K He, J Chen, Q Zhou, R Du… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) enables users to search on the
encrypted database stored on a semi-trusted server while kee** the search and update …

Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data

X Gao, J Yu, Y Chang, H Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The public cloud data integrity auditing technique is used to check the integrity of cloud data
through the Third Party Auditor (TPA). In order to make it more practical, we propose a new …

Towards a physical-world adversarial patch for blinding object detection models

Y Wang, H Lv, X Kuang, G Zhao, Y Tan, Q Zhang… - Information Sciences, 2021 - Elsevier
As one of the core components of the computer vision, the object detection model plays a
vital role in various security-sensitive systems. However, it has been proved that the object …