Privacy and Utility-Assisted Data Protection Strategy for Secure Data Sharing and Retrieval in Cloud System

[1]  Xingyuan Wang,et al.  Fractal sorting matrix and its application on chaotic image encryption , 2021, Inf. Sci..

[2]  Keke Gai,et al.  Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..

[3]  M. N. Vrahatis,et al.  Particle swarm optimization method in multiobjective problems , 2002, SAC '02.

[4]  Reza Tavakkoli-Moghaddam,et al.  Red deer algorithm (RDA): a new nature-inspired meta-heuristic , 2020, Soft Computing.

[5]  Xiaojun Zhang,et al.  Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems , 2020, J. Inf. Secur. Appl..

[6]  Vahideh Hayyolalam,et al.  Black Widow Optimization Algorithm: A novel meta-heuristic approach for solving engineering optimization problems , 2020, Eng. Appl. Artif. Intell..

[7]  S. Chithra,et al.  Tracy-Singh Product and Genetic Whale Optimization Algorithm for Retrievable Data Perturbation for Privacy Preserved Data Publishing in Cloud Computing , 2020, Comput. J..

[8]  Praneeth Babu Marella,et al.  Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology , 2018 .

[9]  Yuqing Zhang,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[10]  Alan H. Karp,et al.  Fusion: Managing Healthcare Records at Cloud Scale , 2012, Computer.

[11]  Hongyu Zhao,et al.  Fast image encryption algorithm based on parallel computing system , 2019, Inf. Sci..

[12]  Xingyuan Wang,et al.  Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory , 2020, Inf. Sci..

[13]  Jianqiang Li,et al.  A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..

[14]  R. Engle,et al.  CAViaR , 1999 .

[15]  Jiankun Hu,et al.  Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.

[16]  Dan Lin,et al.  Ensuring Distributed Accountability for Data Sharing in the Cloud , 2012, IEEE Transactions on Dependable and Secure Computing.

[17]  Jian Shen,et al.  SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems , 2018, Future Gener. Comput. Syst..

[18]  Athanasios V. Vasilakos,et al.  BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..

[19]  Xiaoyu Wang,et al.  An encrypted coverless information hiding method based on generative models , 2021, Inf. Sci..

[20]  Li Xiong,et al.  A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy , 2017, IEEE Transactions on Dependable and Secure Computing.

[21]  Rongxing Lu,et al.  EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption , 2014, J. Comput. Syst. Sci..

[22]  Yu Liu,et al.  A new bio-inspired optimisation algorithm: Bird Swarm Algorithm , 2016, J. Exp. Theor. Artif. Intell..

[23]  Yaling Zhang,et al.  A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems , 2018, IEEE Access.

[24]  Fagen Li,et al.  A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud , 2020, J. Syst. Archit..

[25]  Keke Gai,et al.  Blockchain-Enabled Reengineering of Cloud Datacenters , 2018, IEEE Cloud Computing.

[26]  Robert H. Deng,et al.  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[27]  Xingyuan Wang,et al.  Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network , 2020, Inf. Sci..

[28]  Osama Ahmed Khashan Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System , 2020, IEEE Access.

[29]  Yue Cao,et al.  Blockchain based permission delegation and access control in Internet of Things (BACI) , 2019, Comput. Secur..

[30]  Yuguang Fang,et al.  Cross-Domain Data Sharing in Distributed Electronic Health Record Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.

[31]  Pubudu N. Pathirana,et al.  Blockchain for Secure EHRs Sharing of Mobile Cloud Based E-Health Systems , 2019, IEEE Access.