- Cryptography and Data Security
- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
- Advanced MIMO Systems Optimization
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Security in Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Energy Efficient Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Advanced Wireless Network Optimization
- Cognitive Radio Networks and Spectrum Sensing
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Wireless Networks and Protocols
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- Age of Information Optimization
- Vehicular Ad Hoc Networks (VANETs)
- User Authentication and Security Systems
- Energy Harvesting in Wireless Networks
- Complexity and Algorithms in Graphs
- Wireless Communication Security Techniques
- Advanced Malware Detection Techniques
- Full-Duplex Wireless Communications
Virginia Tech
2016-2025
National Institute of Information and Communications Technology
2021
Temple University
2021
The University of Sydney
2021
Osaka University
2021
Guangzhou University
2020
The University of Texas at San Antonio
2020
China Electric Power Research Institute
2020
Newcastle University
2020
State Key Laboratory of Cryptology
2020
Cloud computing is an emerging paradigm in which resources of the infrastructure are provided as services over Internet. As promising it is, this also brings forth many new challenges for data security and access control when users outsource sensitive sharing on cloud servers, not within same trusted domain owners. To keep user confidential against untrusted existing solutions usually apply cryptographic methods by disclosing decryption keys only to authorized users. However, doing so, these...
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves application software and databases to centralized large data centers, where management services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have well understood. work studies problem ensuring integrity storage in Computing. In particular, we consider task allowing a third party auditor (TPA), on behalf cloud client, verify dynamic stored...
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into cloud so to enjoy on-demand high quality applications and services from shared pool configurable resources. By outsourcing, be relieved burden local storage maintenance. However, fact that no longer have physical possession possibly large size outsourced makes integrity protection in very challenging potentially formidable task, especially for with constrained resources...
Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications services from a shared pool of configurable computing resources, without burden local storage maintenance. However, fact that no longer have physical possession outsourced makes integrity protection in formidable task, especially for with constrained resources. Moreover, should be able to just use as if it is local, worrying about need verify its integrity. Thus, enabling public...
Personal health record (PHR) is an emerging patient-centric model of information exchange, which often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns personal could exposed those party servers and unauthorized parties. To assure the patients' control over access their own PHRs, it promising method encrypt PHRs before outsourcing. Yet, issues risks exposure, scalability in key management, flexible access, efficient user...
With the advent of cloud computing, data owners are motivated to outsource their complex management systems from local sites commercial public for great flexibility and economic savings. But protecting privacy, sensitive have be encrypted before outsourcing, which obsoletes traditional utilization based on plaintext keyword search. Thus, enabling an search service is paramount importance. Considering large number users documents in cloud, it necessary allow multiple keywords request return...
As Cloud Computing becomes prevalent, more and sensitive information are being centralized into the cloud. For protection of data privacy, usually have to be encrypted before outsourcing, which makes effective utilization a very challenging task. Although traditional searchable encryption schemes allow user securely search over through keywords selectively retrieve files interest, these techniques support only exact keyword search. That is, there is no tolerance minor typos format...
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where services are under proper physical, logical and personnel controls, cloud moves application software databases large data centers, management may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have well understood. this article, we focus on storage security, always an important aspect quality service. To...
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For protection of data privacy, has to be encrypted before outsourcing, which makes effective utilization a very challenging task. Although traditional searchable encryption schemes allow users securely search over through keywords, these techniques support only boolean search, without capturing any relevance files. This approach suffers from two main drawbacks when directly applied...
Since the inception of Bitcoin, cryptocurrencies and underlying blockchain technology have attracted an increasing interest from both academia industry. Among various core components, consensus protocol is defining behind security performance blockchain. From incremental modifications Nakamoto to innovative alternative mechanisms, many protocols been proposed improve network itself or accommodate other specific application needs. In this survey, we present a comprehensive review analysis on...
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without burden of local hardware software management. Though benefits are clear, such a service is also relinquishing users' physical possession outsourced data, which inevitably poses new security risks toward correctness in cloud. In order address this problem further achieve secure dependable service, we propose paper flexible distributed integrity auditing mechanism, utilizing...
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user associated with set attributes and data are encrypted structures on attributes. A able to decrypt ciphertext if only his satisfy the structure. Beside this basic property, practical applications usually have other requirements. paper we focus an important issue attribute revocation which cumbersome CP-ABE schemes. particular,...
The wireless body area network has emerged as a new technology for e-healthcare that allows the data of patient's vital parameters and movements to be collected by small wearable or implantable sensors communicated using short-range communication techniques. WBAN shown great potential in improving healthcare quality, thus found wide range applications from ubiquitous health monitoring computer assisted rehabilitation emergency medical response systems. security privacy protection WBAN,...
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce space upload bandwidth. Promising as it is, an arising challenge perform secure storage. Although convergent encryption extensively adopted deduplication, critical issue making practical efficiently reliably manage huge number keys. This paper makes the first attempt formally address problem achieving efficient reliable key management deduplication. We introduce...
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect privacy, sensitive cloud have be encrypted before outsourced commercial public cloud, which makes effective utilization a very challenging task. Although traditional searchable encryption techniques allow users securely search over through keywords, they support only Boolean and are not yet sufficient meet need that is inherently demanded by large number huge amount files in cloud. In this...
With the advent of cloud computing, data owners are motivated to outsource their complex management systems from local sites commercial public for great flexibility and economic savings. But protecting privacy, sensitive has be encrypted before outsourcing, which obsoletes traditional utilization based on plaintext keyword search. Thus, enabling an search service is paramount importance. Considering large number users documents in cloud, it necessary allow multiple keywords request return...
Cloud computing is the long dreamed vision of as a utility, where data owners can remotely store their in cloud to enjoy on-demand high-quality applications and services from shared pool configurable resources. While outsourcing relieves burden local storage maintenance, it also eliminates physical control dependability security, which traditionally has been expected by both enterprises individuals with high service-level requirements. In order facilitate rapid deployment service regain...
Data deduplication is one of important data compression techniques for eliminating duplicate copies repeating data, and has been widely used in cloud storage to reduce the amount space save bandwidth. To protect confidentiality sensitive while supporting deduplication, convergent encryption technique proposed encrypt before outsourcing. better security, this paper makes first attempt formally address problem authorized deduplication. Different from traditional systems, differential...
Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to encryption. However, one of main efficiency drawbacks IBE overhead computation Private Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but cumbersome certificates precisely burden that strives alleviate. In this paper, aiming tackling critical issue identity revocation, we...
Enabling keyword search directly over encrypted data is a desirable technique for effective utilization of outsourced to the cloud. Existing solutions provide multi-keyword exact that does not tolerate spelling error, or single fuzzy tolerates typos certain extent. The current schemes rely on building an expanded index covers possible misspelling, which lead significantly larger file size and higher complexity. In this paper, we propose novel scheme by exploiting locality-sensitive hashing...
In cloud computing, clients usually outsource their data to the storage servers reduce management costs. While those may contain sensitive personal information, cannot be fully trusted in protecting them. Encryption is a promising way protect confidentiality of outsourced data, but it also introduces much difficulty performing effective searches over encrypted information. Most existing works do not support efficient with complex query conditions, and care needs taken when using them because...
Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose suite location-based compromise-tolerant security mechanisms. Based on new cryptographic concept called pairing, notion keys (LBKs) by binding private individual nodes both their IDs geographic locations. We then develop an LBK-based neighborhood authentication scheme localize vicinity. also present efficient approaches...