Xixun Yu

ORCID: 0000-0003-3461-8856
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Software-Defined Networks and 5G
  • Advanced Memory and Neural Computing
  • Complexity and Algorithms in Graphs
  • Data Management and Algorithms
  • Digital and Cyber Forensics
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing

Xidian University
2016-2023

Hainan University
2023

Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud is data storage. In order to preserve privacy holders, are often stored in an encrypted form. However, introduce challenges for deduplication, which becomes crucial big storage processing cloud. Traditional deduplication schemes cannot work on data. Existing solutions suffer from security weakness. They flexibly support access control revocation....

10.1109/tbdata.2016.2587659 article EN IEEE Transactions on Big Data 2016-06-01

10.1007/s11036-017-0872-3 article EN Mobile Networks and Applications 2017-05-06

10.1016/j.ins.2018.12.022 article EN Information Sciences 2018-12-17

Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by "things." Cloud computing plays an important role for big processing providing and services. However, cloud service providers may invade privacy provide inaccurate results users, thus cannot be fully trusted. On other hand, limited computation resources capabilities, users mostly independently process perform verification correctness processing. This raises a special challenge...

10.1109/access.2017.2666839 article EN cc-by-nc-nd IEEE Access 2017-01-01

Data deduplication is a technique to eliminate duplicate data in order save storage space and enlarge upload bandwidth, which has been applied by cloud systems. However, provider (CSP) may tamper user or cheat users pay unused for that are only stored once. Although previous solutions adopt message-locked encryption along with Proof of Retrievability (PoR) check the integrity deduplicated encrypted data, they ignore proving correctness duplication during require same file be derived into...

10.1109/tdsc.2022.3141521 article EN cc-by IEEE Transactions on Dependable and Secure Computing 2022-01-10

As cloud computing reshapes the global IT industry, an increasing number of business owners have outsourced their datasets to third-party service providers (CSP), which in turn answer data queries from end users on behalf. A well known security challenge outsourcing is that CSP cannot be fully trusted, may return inauthentic or unsound query results for various reasons. This paper considers top-k selection queries, important type widely used practice. In a query, user specifies scoring...

10.1109/iwqos52092.2021.9521321 article EN 2021-06-25
Coming Soon ...