• Publications
  • Influence
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
TLDR
This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption. Expand
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
TLDR
The task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud is considered, and an elegant verification scheme is constructed for seamless integration of these two salient features in the protocol design. Expand
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
TLDR
This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements. Expand
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
TLDR
This paper formalizes and solves the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy, and exploits edit distance to quantify keywords similarity and develops an advanced technique on constructing fuzzy keyword sets, which greatly reduces the storage and representation overheads. Expand
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
TLDR
To achieve efficient data dynamics, the existing proof of storage models are improved by manipulating the classic Merkle Hash Tree construction for block tag authentication, and an elegant verification scheme is constructed for the seamless integration of these two salient features in the protocol design. Expand
Attribute based data sharing with attribute revocation
TLDR
This paper uniquely integrates the technique of proxy re-encryption with CP-ABE, and enables the authority to delegate most of laborious tasks to proxy servers, and shows that the proposed scheme is provably secure against chosen ciphertext attacks. Expand
Secure Ranked Keyword Search over Encrypted Cloud Data
TLDR
This paper defines and solves the problem of effective yet secure ranked keyword search over encrypted cloud data, and proposes a definition for ranked searchable symmetric encryption, and gives an efficient design by properly utilizing the existing cryptographic primitive, order-preserving asymmetric encryption (OPSE). Expand
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
TLDR
This paper defines and solves the problem of secure ranked keyword search over encrypted cloud data, and explores the statistical measure approach from information retrieval to build a secure searchable index, and develops a one-to-many order-preserving mapping technique to properly protect those sensitive score information. Expand
Toward Secure and Dependable Storage Services in Cloud Computing
TLDR
This paper proposes a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data, which is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. Expand
Ensuring data storage security in Cloud Computing
TLDR
This work proposes an effective and flexible distributed scheme with two salient features, opposing to its predecessors, that achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Expand
...
1
2
3
4
5
...