scispace - formally typeset
Journal ArticleDOI

Intelligent cryptography approach for secure distributed big data storage in cloud computing

Reads0
Chats0
TLDR
An intelligent cryptography approach, by which the cloud service operators cannot directly reach partial data is proposed, and experimental results depict that the approach can effectively defend main threats from clouds and requires with an acceptable computation time.
About
This article is published in Information Sciences.The article was published on 2017-05-01. It has received 196 citations till now. The article focuses on the topics: Cloud computing security & Cloud computing.

read more

Citations
More filters
Journal ArticleDOI

A survey on FinTech

TL;DR: This work aims to produce a survey of FinTech by collecting and reviewing contemporary achievements, by which a theoretical data-driven FinTech framework is proposed and five technical aspects are summarized and involved.
Journal Article

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute–Based Encryption

TL;DR: A cloud-based PHR system taking a radically new architectural solution to health record portability and a prototype of My PHR Machines applied to two use cases, i.e., radiology image sharing and personalized medicine are discussed.
Journal ArticleDOI

Multimedia big data computing and Internet of Things applications: A taxonomy and process model

TL;DR: This process model addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (QoS) requirements.
Journal ArticleDOI

A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion

TL;DR: A reliable and lightweight trust mechanism is originally proposed for IoT edge devices based on multi-source feedback information fusion based on objective information entropy theory, which can overcome the limitations of traditional trust schemes.
Journal ArticleDOI

Privacy-preserving wireless communications using bipartite matching in social big data

TL;DR: This paper proposes a novel algorithm using communication management techniques for enhancing the security of the systems and supporting applications with real-time constraints that can reduce the security cost by up to 32.62% and 23.37% on average, respectively, compare to the traditional methods.
References
More filters
Journal ArticleDOI

Data-intensive applications, challenges, techniques and technologies: A survey on Big Data

TL;DR: This paper is aimed to demonstrate a close-up view about Big Data, including Big Data applications, Big Data opportunities and challenges, as well as the state-of-the-art techniques and technologies currently adopt to deal with the Big Data problems.
Proceedings ArticleDOI

Leveled) fully homomorphic encryption without bootstrapping

TL;DR: A novel approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions, using some new techniques recently introduced by Brakerski and Vaikuntanathan (FOCS 2011).
Journal ArticleDOI

Improved proxy re-encryption schemes with applications to secure distributed storage

TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Journal ArticleDOI

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

TL;DR: A novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers are proposed and a high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE.
Journal ArticleDOI

A survey on trust management for Internet of Things

TL;DR: This paper investigates the properties of trust, proposes objectives of IoT trust management, and provides a survey on the current literature advances towards trustworthy IoT to propose a research model for holistic trust management in IoT.
Related Papers (5)