- Cryptography and Data Security
- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
- Software-Defined Networks and 5G
- Advanced Memory and Neural Computing
- Complexity and Algorithms in Graphs
- Data Management and Algorithms
- Digital and Cyber Forensics
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
Xidian University
2016-2023
Hainan University
2023
Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud is data storage. In order to preserve privacy holders, are often stored in an encrypted form. However, introduce challenges for deduplication, which becomes crucial big storage processing cloud. Traditional deduplication schemes cannot work on data. Existing solutions suffer from security weakness. They flexibly support access control revocation....
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by "things." Cloud computing plays an important role for big processing providing and services. However, cloud service providers may invade privacy provide inaccurate results users, thus cannot be fully trusted. On other hand, limited computation resources capabilities, users mostly independently process perform verification correctness processing. This raises a special challenge...
Data deduplication is a technique to eliminate duplicate data in order save storage space and enlarge upload bandwidth, which has been applied by cloud systems. However, provider (CSP) may tamper user or cheat users pay unused for that are only stored once. Although previous solutions adopt message-locked encryption along with Proof of Retrievability (PoR) check the integrity deduplicated encrypted data, they ignore proving correctness duplication during require same file be derived into...
As cloud computing reshapes the global IT industry, an increasing number of business owners have outsourced their datasets to third-party service providers (CSP), which in turn answer data queries from end users on behalf. A well known security challenge outsourcing is that CSP cannot be fully trusted, may return inauthentic or unsound query results for various reasons. This paper considers top-k selection queries, important type widely used practice. In a query, user specifies scoring...