• Publications
  • Influence
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forthExpand
  • 1,896
  • 99
  • PDF
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the managementExpand
  • 1,131
  • 87
  • PDF
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services fromExpand
  • 1,088
  • 61
  • PDF
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted beforeExpand
  • 906
  • 47
  • PDF
Attribute based data sharing with attribute revocation
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set ofExpand
  • 807
  • 47
  • PDF
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the managementExpand
  • 1,007
  • 46
  • PDF
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypted beforeExpand
  • 807
  • 41
  • PDF
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial publicExpand
  • 527
  • 34
  • PDF
Ensuring data storage security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnelExpand
  • 623
  • 31
  • PDF
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Providing desirable data security, that is, confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is challenging, as a WSN usually consists of a large number of resourceExpand
  • 194
  • 31
  • PDF