Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Rating prediction based on social sentiment from textual reviews
In recent years, we have witnessed a flourish of review websites. It presents a great
opportunity to share our viewpoints for various products we purchase. However, we face an …
opportunity to share our viewpoints for various products we purchase. However, we face an …
Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks
Mobile edge computing (MEC) is a promising paradigm to provide cloud-computing
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …
Enabling personalized search over encrypted outsourced data with efficiency improvement
In cloud computing, searchable encryption scheme over outsourced data is a hot research
field. However, most existing works on encrypted search over outsourced cloud data follow …
field. However, most existing works on encrypted search over outsourced cloud data follow …
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
Security in Internet of Things: issues, challenges, taxonomy, and architecture
V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …
Internet, those with a digital identity, is increasing day by day. With the developments in the …
An efficient public auditing protocol with novel dynamic structure for cloud data
With the rapid development of cloud computing, cloud storage has been accepted by an
increasing number of organizations and individuals, therein serving as a convenient and on …
increasing number of organizations and individuals, therein serving as a convenient and on …
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …
Firefly algorithm with neighborhood attraction
Firefly algorithm (FA) is a new optimization technique based on swarm intelligence. It
simulates the social behavior of fireflies. The search pattern of FA is determined by the …
simulates the social behavior of fireflies. The search pattern of FA is determined by the …
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …
information about the physical conditions of patients. Due to the openness and mobility of …