Data security and privacy protection for cloud storage: A survey
P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …
transformation and world's digital economy are at the top of the tide. The continuous growth …
Blockchain based searchable encryption for electronic health record sharing
Data leakage in electronic health records (EHRs) could result in the compromise of patient
privacy (eg medical conditions). Generally most data in EHRs remain unchanged once they …
privacy (eg medical conditions). Generally most data in EHRs remain unchanged once they …
Secure searchable encryption: a survey
Cloud computing facilitates convenient and on-demand network access to a centralized pool
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …
Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data
In medical cloud computing, a patient can remotely outsource her medical data to the cloud
server. In this case, only authorized doctors are allowed to access the data since the medical …
server. In this case, only authorized doctors are allowed to access the data since the medical …
Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
Search over encrypted data is a critically important enabling technique in cloud computing,
where encryption-before-outsourcing is a fundamental solution to protecting user data …
where encryption-before-outsourcing is a fundamental solution to protecting user data …
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
Using cloud computing, individuals can store their data on remote servers and allow data
access to public users through the cloud servers. As the outsourced data are likely to contain …
access to public users through the cloud servers. As the outsourced data are likely to contain …
Outsourced analysis of encrypted graphs in the cloud with privacy protection
Huge diagrams have unique properties for organizations and research, such as client
linkages in informal organizations and customer evaluation lattices in social channels. They …
linkages in informal organizations and customer evaluation lattices in social channels. They …
Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing
With the advent of cloud computing, it has become increasingly popular for data owners to
outsource their data to public cloud servers while allowing data users to retrieve this data …
outsource their data to public cloud servers while allowing data users to retrieve this data …
Enabling verifiable and dynamic ranked search over outsourced data
Cloud computing as a promising computing paradigm is increasingly utilized as potential
hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' …
hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' …
A novel blockchain-based privacy-preserving framework for online social networks
S Zhang, T Yao, VK Arthur Sandor, TH Weng… - Connection …, 2021 - Taylor & Francis
Online social networks (OSNs) are nowadays an important field of applications thanks to the
recent surge in online interaction. However, the illegal disclosure of user's private data can …
recent surge in online interaction. However, the illegal disclosure of user's private data can …