Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Secure searchable encryption: a survey
Cloud computing facilitates convenient and on-demand network access to a centralized pool
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …
Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …
medical records (EMRs) are widely applied in hospital information systems. However …
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …
User-level privacy-preserving federated learning: Analysis and performance optimization
Federated learning (FL), as a type of collaborative machine learning framework, is capable
of preserving private data from mobile terminals (MTs) while training the data into useful …
of preserving private data from mobile terminals (MTs) while training the data into useful …
Secure keyword search and data sharing mechanism for cloud computing
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …
software resources in computing infrastructure. To ensure security, the data is usually …
Dual-server public-key encryption with keyword search for secure cloud storage
Searchable encryption is of increasing interest for protecting the data privacy in secure
searchable cloud storage. In this paper, we investigate the security of a well-known …
searchable cloud storage. In this paper, we investigate the security of a well-known …
Certificateless public key authenticated encryption with keyword search for industrial internet of things
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile
devices, and communication technologies to enable the upgrade of traditional industries to …
devices, and communication technologies to enable the upgrade of traditional industries to …
Privacy-preserving attribute-based keyword search in shared multi-owner setting
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …
supports fine-grained access control over encrypted data in the cloud. However, prior CP …
Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds
An electronic health (e-health) record system is a novel application that will bring great
convenience in healthcare. The privacy and security of the sensitive personal information …
convenience in healthcare. The privacy and security of the sensitive personal information …