Edge computing and sensor-cloud: Overview, solutions, and directions
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …
Resource allocation and trust computing for blockchain-enabled edge computing system
In order to meet various needs of people, different Internet of Things (IoT) devices have been
developed and applied successfully in recent years. However, the consequent challenges in …
developed and applied successfully in recent years. However, the consequent challenges in …
BPVSE: Publicly verifiable searchable encryption for cloud-assisted electronic health records
Cloud-assisted electronic health records (EHRs) provide convenient medical services for
patients by storing and analyzing medical data records in the cloud, but searching for …
patients by storing and analyzing medical data records in the cloud, but searching for …
Efficient privacy-preserving spatial data query in cloud computing
With the rapid development of geographic location technology and the explosive growth of
data, a large amount of spatial data is outsourced to the cloud server for reducing the local …
data, a large amount of spatial data is outsourced to the cloud server for reducing the local …
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA
With the massive growth of the World Wide Web (ie, internet), individual users or companies
can store and manage large amounts of sensitive data to outsource it to the cloud server …
can store and manage large amounts of sensitive data to outsource it to the cloud server …
A more efficient public-key authenticated encryption scheme with keyword search
To realize ciphertext retrieval without decryption in the public key settings, Boneh et al. in
2004 proposed a cryptographic primitive named Public-key Encryption with Keyword Search …
2004 proposed a cryptographic primitive named Public-key Encryption with Keyword Search …
Privacy-preserving dynamic multi-keyword ranked search scheme in multi-user settings
D Xu, C Peng, W Wang, H Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of consumer electronics in Industry 5.0, personalized service
supplement based on the cloud infrastructure for the Internet of Things (IoT) has been a …
supplement based on the cloud infrastructure for the Internet of Things (IoT) has been a …
Privacy-preserving searchable encryption scheme based on public and private blockchains
R Du, C Ma, M Li - Tsinghua Science and Technology, 2022 - ieeexplore.ieee.org
While users enjoy the convenience of data outsourcing in the cloud, they also face the risks
of data modification and private information leakage. Searchable encryption technology can …
of data modification and private information leakage. Searchable encryption technology can …
Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems
In the era of cloud computing, massive quantities of data are encrypted and uploaded to the
cloud to realize a variety of applications and services while protecting user confidentiality …
cloud to realize a variety of applications and services while protecting user confidentiality …
Privacy-preserving multi-user outsourced computation for boolean circuits
With the prevalence of outsourced computation, such as Machine Learning as a Service,
protecting the privacy of sensitive data throughout the whole computation is a critical yet …
protecting the privacy of sensitive data throughout the whole computation is a critical yet …