[HTML][HTML] A survey of fault tolerance in cloud computing

P Kumari, P Kaur - Journal of King Saud University-Computer and …, 2021 - Elsevier
Cloud computing has brought about a transformation in the delivery model of information
technology from a product to a service. It has enabled the availability of various software …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Secure multi-party computation: theory, practice and applications

C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li… - Information Sciences, 2019 - Elsevier
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …

A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds

C Ge, W Susilo, J Baek, Z Liu, J Xia… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang - Journal of Network and …, 2018 - Elsevier
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …

Enabling efficient and geometric range query with access control over encrypted spatial data

G Xu, H Li, Y Dai, K Yang, X Lin - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …

An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks

M Ma, D He, H Wang, N Kumar… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The maturity of cloud computing, the Internet of Things technology, and intelligent
transportation system has promoted the rapid development of vehicular ad-hoc networks …

[PDF][PDF] 云计算环境安全综述

张玉清, 王晓菲, 刘雪峰, 刘玲 - 软件学报, 2016 - jos.org.cn
伴随云计算技术的飞速发展, 其所面临的安全问题日益凸显, 在工业界和学术界引起了广泛的
关注. 传统的云基础架构中存在较高安全风险, 攻击者对虚拟机的非法入侵破坏了云服务或资源 …

A privacy-preserving and untraceable group data sharing scheme in cloud computing

J Shen, H Yang, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the development of cloud computing, the great amount of storage data requires safe
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …

Quantum-safe round-optimal password authentication for mobile devices

Z Li, D Wang, E Morais - IEEE transactions on dependable and …, 2020 - ieeexplore.ieee.org
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …