Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Secure searchable encryption: a survey

Y Wang, J Wang, X Chen - Journal of communications and information …, 2016 - Springer
Cloud computing facilitates convenient and on-demand network access to a centralized pool
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …

Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search

H Li, Q Huang, J Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

Q Huang, H Li - Information Sciences, 2017 - Elsevier
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …

User-level privacy-preserving federated learning: Analysis and performance optimization

K Wei, J Li, M Ding, C Ma, H Su… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Federated learning (FL), as a type of collaborative machine learning framework, is capable
of preserving private data from mobile terminals (MTs) while training the data into useful …

Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J **a… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

Dual-server public-key encryption with keyword search for secure cloud storage

R Chen, Y Mu, G Yang, F Guo… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Searchable encryption is of increasing interest for protecting the data privacy in secure
searchable cloud storage. In this paper, we investigate the security of a well-known …

Certificateless public key authenticated encryption with keyword search for industrial internet of things

D He, M Ma, S Zeadally, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile
devices, and communication technologies to enable the upgrade of traditional industries to …

Privacy-preserving attribute-based keyword search in shared multi-owner setting

Y Miao, X Liu, KKR Choo, RH Deng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …

Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds

Y Yang, M Ma - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
An electronic health (e-health) record system is a novel application that will bring great
convenience in healthcare. The privacy and security of the sensitive personal information …