Cloud Cryptography: Theory, Practice and Future Research Directions

Cloud computing, a convenient way of accessing services, resources and applications over the Internet, shifts the focus of industries and organizations away from the deployment and day-to-day running of their IT facilities by providing an on-demand, self-service, and pay-asyou-go business model. It is, therefore, unsurprising that cloud computing has continued to increase in popularity in recent times.

[1]  Kim-Kwang Raymond Choo,et al.  Balancing Privacy with Legitimate Surveillance and Lawful Data Access , 2015, IEEE Cloud Comput..

[2]  Chun-I Fan,et al.  Enabled/disabled predicate encryption in clouds , 2016, Future Gener. Comput. Syst..

[3]  Joan Feigenbaum,et al.  Towards a theory of data entanglement , 2007, Theor. Comput. Sci..

[4]  Jiankun Hu,et al.  Batch Public Key Cryptosystem with batch multi-exponentiation , 2016, Future Gener. Comput. Syst..

[5]  Fangguo Zhang,et al.  Memory leakage-resilient searchable symmetric encryption , 2016, Future Gener. Comput. Syst..

[6]  Yongge Wang,et al.  Garbled computation in cloud , 2016, Future Gener. Comput. Syst..

[7]  Athanasios V. Vasilakos,et al.  Cloud data integrity checking with an identity-based auditing mechanism from RSA , 2016, Future Gener. Comput. Syst..

[8]  Josep Domingo-Ferrer,et al.  Privacy-preserving distributed statistical computation to a semi-honest multi-cloud , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[9]  Jiankun Hu,et al.  Secure searches in the cloud: A survey , 2016, Future Gener. Comput. Syst..

[10]  LuRongxing,et al.  Efficient and privacy-preserving skyline computation framework across domains , 2016 .

[11]  Ivan Damgård,et al.  Entangled cloud storage , 2016, Future Gener. Comput. Syst..

[12]  Joseph K. Liu,et al.  Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.

[13]  Kim-Kwang Raymond Choo,et al.  The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[14]  Josep Domingo-Ferrer,et al.  Simultaneous authentication and secrecy in identity-based data upload to cloud , 2013, Cluster Computing.

[15]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..

[16]  ZhangFangguo,et al.  Memory leakage-resilient searchable symmetric encryption , 2016 .

[17]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[18]  Xiaodong Lin,et al.  Fine-grained data sharing in cloud computing for mobile devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[19]  Jianfeng Ma,et al.  Efficient and privacy-preserving skyline computation framework across domains , 2016, Future Gener. Comput. Syst..

[20]  P. Grabosky The Internet, Technology, and Organized Crime , 2007 .

[21]  Kim-Kwang Raymond Choo,et al.  Cloud based data sharing with fine-grained proxy re-encryption , 2016, Pervasive Mob. Comput..

[22]  Keith M. Martin,et al.  Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment , 2017, Cryptogr..

[23]  Yang Lu,et al.  A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds , 2016, Future Gener. Comput. Syst..

[24]  Jianwei Liu,et al.  Identity-based proxy re-encryption version 2: Making mobile access easy in cloud , 2016, Future Gener. Comput. Syst..

[25]  Kim-Kwang Raymond Choo,et al.  Remote Wiping and Secure Deletion on Mobile Devices: A Review , 2016, Journal of forensic sciences.

[26]  Josep Domingo-Ferrer,et al.  Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..

[27]  Joseph K. Liu,et al.  Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing , 2016, Future Gener. Comput. Syst..

[28]  Wu-Lin Chen,et al.  Probability-based reversible image authentication scheme for image demosaicking , 2016, Future Gener. Comput. Syst..

[29]  Sébastien Canard,et al.  Highly privacy-protecting data sharing in a tree structure , 2016, Future Gener. Comput. Syst..

[30]  Athanasios V. Vasilakos,et al.  Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..