Data security and privacy protection for cloud storage: A survey
P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …
transformation and world's digital economy are at the top of the tide. The continuous growth …
Security and privacy-preserving challenges of e-health solutions in cloud computing
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …
health solutions indicates various privacy preserving approaches to ensure privacy and …
Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain
Electronic health record sharing can help to improve the accuracy of diagnosis, where
security and privacy preservation are critical issues in the systems. In recent years …
security and privacy preservation are critical issues in the systems. In recent years …
Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …
medical records (EMRs) are widely applied in hospital information systems. However …
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …
A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Cryptographic cloud storage
We consider the problem of building a secure cloud storage service on top of a public cloud
infrastructure where the service provider is not completely trusted by the customer. We …
infrastructure where the service provider is not completely trusted by the customer. We …
Certificateless searchable public key encryption scheme for industrial internet of things
With the widespread adoption of Internet of Things and cloud computing in different industry
sectors, an increasing number of individuals or organizations are outsourcing their Industrial …
sectors, an increasing number of individuals or organizations are outsourcing their Industrial …
Dual-server public-key encryption with keyword search for secure cloud storage
Searchable encryption is of increasing interest for protecting the data privacy in secure
searchable cloud storage. In this paper, we investigate the security of a well-known …
searchable cloud storage. In this paper, we investigate the security of a well-known …