Blockchain for Secure EHRs Sharing of Mobile Cloud based E-health Systems Abstract-Recent years have witnessed a paradigm shift in storage of Electronic Health Records (EHRs) on mobile cloud environments where mobile devices are integrated with cloud computing to facilitate medical data exchanges among patients and healthcare providers. This advanced model enables healthcare services with low…
Enabling Cloud Storage Auditing With Key-Exposure Resistance Abstract? Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client?s secret key for auditing is absolutely secure. However, such assumption may not always be held, due…
Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates Abstract?Key-exposure resistance has always been an important issue for in-depth cyber defence in many security applications. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons…
Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates Abstract?Enabling Cloud Storage Auditing with Verifiable. Outsourcing of Key Updates Key-exposure resistance has always been an important issue for in-depth cyber defense in many security applications. Recently, how to deal with the key exposure problem in the settings of cloud storage auditing has been proposed…
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Abstract? Storage-as-a-service offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud-based storage scheme that allows the data owner to benefit from…
Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage Abstract?Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage. A fundamental application is to outsource the mobile data to external cloud servers for scalable data storage. The outsourced data, however, need to be encrypted due to the privacy…
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data Abstract? Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data. Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the cloud servers. As the outsourced data are likely to contain sensitive privacy…
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services Abstract-Searchable Symmetric Encryption (SSE) has been widely studied in cloud storage, which allows cloud services to directly search over encrypted data. Most SSE schemes only work with honest-but-curious cloud services that do not deviate from the prescribed protocols. However, this assumption does not always hold…
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services Abstract-Searchable Symmetric Encryption (SSE) has been widely studied in cloud storage, which allows cloud services to directly search over encrypted data. Most SSE schemes only work with honest-but-curious cloud services that do not deviate from the prescribed protocols. However, this assumption does not always hold…
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services Abstract-Searchable Symmetric Encryption (SSE) has been widely studied in cloud storage, which allows cloud services to directly search over encrypted data. Most SSE schemes only work with honest-but-curious cloud services that do not deviate from the prescribed protocols. However, this assumption does not always hold…
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme Abstract-With increasing popularity of cloud computing, the data owners outsource their sensitive data to cloud servers for flexibility and reduced cost in data management. To protect data privacy the sensitive data should be encrypted by the data owner before outsourcing which obsoletes data utilization like keyword-based document…
Enabling Technologies for the Internet of Health Things Abstract-The Internet of Things (IoT) is one of the most promising technologies for the near future. Healthcare and well-being will receive great benefits with the evolution of this technology. This work presents a review of techniques based on IoT for healthcare and ambient assisted living, defined as…