[HTML][HTML] All one needs to know about fog computing and related edge computing paradigms: A complete survey

A Yousefpour, C Fung, T Nguyen, K Kadiyala… - Journal of Systems …, 2019 - Elsevier
Abstract With the Internet of Things (IoT) becoming part of our daily life and our environment,
we expect rapid growth in the number of connected devices. IoT is expected to connect …

Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …

[HTML][HTML] Cyberattacks and security of cloud computing: a complete guideline

M Dawood, S Tu, C **ao, H Alasmary, M Waqas… - Symmetry, 2023 - mdpi.com
Cloud computing is an innovative technique that offers shared resources for stock cache and
server management. Cloud computing saves time and monitoring costs for any organization …

Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021 - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

Enabling efficient user revocation in identity-based cloud storage auditing for shared big data

Y Zhang, J Yu, R Hao, C Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud storage auditing schemes for shared data refer to checking the integrity of cloud data
shared by a group of users. User revocation is commonly supported in such schemes, as …

Cloud based security on outsourcing using blockchain in E-health systems

T Benil, J Jasper - Computer Networks, 2020 - Elsevier
Abstract Recently, Electronic Health Records (EHR) plays a significant role in E-health care
system that allows data exchange of patient's health records via a portal designated by …

COMITMENT: A fog computing trust management approach

M Al-Khafajiy, T Baker, M Asim, Z Guo, R Ranjan… - Journal of Parallel and …, 2020 - Elsevier
As an extension of cloud computing, fog computing is considered to be relatively more
secure than cloud computing due to data being transiently maintained and analyzed on …

Strong key-exposure resilient auditing for secure cloud storage

J Yu, H Wang - IEEE Transactions on Information Forensics …, 2017 - ieeexplore.ieee.org
Key exposure is one serious security problem for cloud storage auditing. In order to deal
with this problem, cloud storage auditing scheme with key-exposure resilience has been …

Data integrity auditing without private key storage for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Using cloud storage services, users can store their data in the cloud to avoid the expenditure
of local data storage and maintenance. To ensure the integrity of the data stored in the …

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data

X Jiang, J Yu, J Yan, R Hao - Information Sciences, 2017 - Elsevier
With the prevalence of the cloud computing, data owners can outsource their data to the
cloud server to enjoy convenient services. To ensure the user's data confidentiality, the …