Article
Automation & Control Systems
Cheng Guo, Shenghao Su, Kim-Kwang Raymond Choo, Xinyu Tang
Summary: Medical imaging plays a crucial role in medical diagnosis, and ensuring the security and privacy of medical images is essential. This paper proposes a secure and efficient scheme for finding the exact nearest neighbor over encrypted medical images, demonstrating its utility in Healthcare Industry 4.0.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Maryam Shabbir, Ayesha Shabbir, Celestine Iwendi, Abdul Rehman Javed, Muhammad Rizwan, Norbert Herencsar, Jerry Chun-Wei Lin
Summary: Despite the numerous advantages of Mobile Cloud Computing in healthcare, its growth is hindered by privacy and security challenges. Urgent attention is needed to strengthen global health information security for better performance and additional security measures.
Article
Automation & Control Systems
Tian Wang, Quan Yang, Xuewei Shen, Thippa Reddy Gadekallu, Weizheng Wang, Kapal Dev
Summary: The article introduces a privacy-enhanced retrieval technology called PERT for cloud-assisted IoT, which preserves data privacy by hiding data transmission information, and the experiments have shown its effectiveness.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Jun Feng, Laurence T. Yang, Xin Nie, Nicholaus J. Gati
Summary: This article proposes a novel edge-cloud-aided differentially private tucker decomposition scheme to protect private data of data owners in CPSS. The scheme achieves efficient tensor factorization while preserving privacy through perturbation and local resolution.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Lei Zhang, Hu Xiong, Qiong Huang, Jiguo Li, Kim-Kwang Raymond Choo, Jiangtao Li
Summary: This paper provides a critique of cryptographic schemes designed for securing sensitive data in the cloud computing environment, as well as outlining research opportunities in the use of cryptographic techniques in cloud computing.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu
Summary: This article discusses the application of differential privacy in data privacy protection and proposes two schemes for outsourcing differential privacy. These schemes effectively address the issues of current differential privacy techniques in adapting to different tasks and budgets, and their effectiveness is verified through experiments.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Jun Zhou, Kim-Kwang Raymond Choo, Zhenfu Cao, Xiaolei Dong
Summary: This research proposes a series of protocols to achieve privacy protection and verifiability for outsourced pattern matching, effectively resisting collusion attacks between the cloud and malicious receiver/sender without utilizing public key fully homomorphic encryption.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Computer Science, Information Systems
Hongjun Li, Fanyu Kong, Jia Yu
Summary: With the rise of cloud computing, outsourcing computation has become a popular service in academic and industry sectors. In this article, a secure and efficient algorithm is proposed to outsource spectral decomposition to an untrusted cloud server, protecting both input and output privacy while ensuring correctness through efficient verification. The results not only reduce computational overhead for clients, but also do not add extra workload on the cloud server, with theoretical analysis and experimental results provided.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Guiqiang Hu, Hongwei Li, Guowen Xu, Xinqiang Ma
Summary: The popularization of cloud computing greatly facilitates the sharing of explosively generated images. However, the privacy protection mechanism commonly used in cloud service makes it difficult to detect and control the spreading of illegal and harmful data. To address this issue, a cloud service framework is proposed that provides privacy protection and content regulation for cloud storage images. A secure multi-party computation protocol is designed to protect data privacy through random projection, enabling content matching while respecting data privacy.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin Lauter
Summary: This article discusses the importance and applications of homomorphic encryption (HE), addresses the issue of secure computations on ciphertexts encrypted under multiple keys, and provides a comprehensive survey and analysis of the latest multi-key techniques and schemes.
ACM COMPUTING SURVEYS
(2022)
Article
Computer Science, Information Systems
Paulo Silva, Edmundo Monteiro, Paulo Simoes
Summary: This article discusses the issues of security and privacy assurances in the transmission and storage of private data online, analyzing various privacy threats, concepts, regulations, and personal data types, as well as Privacy Enhancing Technologies and anonymization mechanisms. Additionally, it also discusses privacy tools, models, and metrics, along with the current research challenges in achieving higher privacy levels in cloud services.
Article
Computer Science, Hardware & Architecture
Zhigang Yang, Ruyan Wang, Honggang Wang, Dapeng Wu
Summary: This article proposes a cloud edge-client collaborative trajectory privacy protection system to address the privacy risks and shortcomings of existing solutions in centralized location-based services (LBS). By migrating LBS from the cloud to the network edge and implementing anonymous authentication, dummy location, and privacy risk evaluation mechanisms, the system effectively protects trajectory privacy while maintaining service and data availability, leading to significant improvements compared to current LBS systems.
Article
Computer Science, Information Systems
Chia-Mu Yu
Summary: Client-side data deduplication can improve the efficiency and user satisfaction of cloud storage services, but it is vulnerable to attacks that expose file existence information. To address the limitations of existing solutions, this paper proposes a random response method (RARE) to enhance privacy protection and reduce communication burden.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo
Summary: This paper proposes an efficient privacy-preserving outsourced discrete wavelet transform scheme in the encrypted domain, which can protect sensitive signals, reduce computational costs, and improve security.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Review
Computer Science, Information Systems
Aqeel Sahi, David Lai, Yan Li
Summary: Cloud computing in eHealth requires high levels of security and privacy for health records. There are serious concerns regarding security and privacy in eHealth clouds, making practical and effective methods essential. An extensive review of 132 studies analyzed the state of the art technologies and approaches, providing eHealth stakeholders and researchers with knowledge on current research trends in privacy and security.
Article
Computer Science, Hardware & Architecture
Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang
Summary: Transfer learning is a technique to generate new models efficiently using knowledge from pre-trained models. However, the availability of pre-trained models introduces vulnerabilities to severe attacks in transfer learning systems. This article presents a defense strategy to mitigate misclassification attacks in transfer learning by designing a distilled differentiator and adopting an ensemble structure. The defense strategy achieves high immunity to adversarial inputs with minimal accuracy loss.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang
Summary: Federated learning is a new paradigm that utilizes diverse data sources to train high quality models without sharing the training datasets. However, sharing model updates in federated learning still poses privacy risks. In this paper, we propose a system design that protects individual model updates efficiently, allowing clients to provide obscured updates while a cloud server performs aggregation. We also explore bandwidth efficiency optimization and security mechanisms against an adversarial cloud server. Experiments on benchmark datasets show that our system achieves comparable accuracy to the plaintext baseline with practical performance.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang
Summary: This paper introduces PressPIN, an enhanced PIN authenticator on mobile devices that senses the pressure from the user's finger. By leveraging the structure-borne propagation of sounds, the pressure on the screen is estimated to form a pressure code. This method increases the entropy of passwords and provides a more secure solution against shoulder surfing attacks.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Huayi Duan, Yuefeng Du, Leqian Zheng, Cong Wang, Man Ho Au, Qian Wang
Summary: Decentralized storage projects like Filecoin require effective auditing mechanisms to ensure data integrity. We propose a dynamic on-chain auditing protocol that produces small auditor states and compact proofs for auditing dynamic data in decentralized storage. By optimizing data structures and techniques, our protocols achieve significantly better performance than previous dynamic PoS schemes for DS. We also introduce a data abstraction layer for deploying the protocols on different storage systems.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Artificial Intelligence
Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. K. Liu, Surya Nepal, Cong Wang
Summary: The increasing adoption of cloud storage systems is driven by the need for cost-effective and easy-to-access solutions as businesses and governments move away from in-house data servers. However, the lack of security in cloud storage has led to numerous large-scale data breaches. To address this issue, this paper introduces ShieldDB, an encrypted document database that incorporates searchable encryption technique while maintaining scalability. A tailored padding countermeasure is implemented to protect against real-world threats and ensure continuous obfuscation of the access pattern to the database. The authors present a comprehensive implementation of ShieldDB and conduct extensive evaluations on Azure Cloud.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
(2023)
Article
Computer Science, Information Systems
Kun Yang, Chengliang Tian, Hequn Xian, Weizhong Tian, Yan Zhang
Summary: This paper introduces encryption methods for privacy protection in cloud databases and improves the security and efficiency through an improved algorithm.
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
(2023)
Article
Automation & Control Systems
Ta Li, Youliang Tian, Jinbo Xiong, Md Zakirul Alam Bhuiyan
Summary: This article proposes a fair, verifiable, and privacy-preserving edge outsourcing computing scheme based on blockchain (FVP-EOC), which ensures the fairness and correctness of edge outsourcing computing through task bidding method and result verification algorithm.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Theory & Methods
Mingyue Wang, Yinbin Miao, Yu Guo, Hejiao Huang, Cong Wang, Xiaohua Jia
Summary: In this article, we propose an attribute-based encrypted search scheme with ownership enhancement for multi-owner and multi-user distributed systems. Our design allows users to search data from authorized owners with only one trapdoor and enables fine-grained attribute level permission for data encryption. The evaluation shows that our scheme is effective and efficient.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2023)
Article
Automation & Control Systems
Hongjun Li, Jia Yu, Jianxi Fan, Yihai Pi
Summary: Edge computing can assist resource-constrained IoT devices in performing complex tasks. Its distributed architecture and low latency provide advantages such as fast response and reliable service for IoT applications. This article proposes a distributed and secure system that utilizes multiple nearby noncolluding edge servers to find the least squares solution to overdetermined systems of linear equations. Experimental evaluations demonstrate that the designed system outperforms existing ones in terms of response speed, computation overload, and efficiency.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2023)
Article
Computer Science, Information Systems
Wenjing Gao, Jia Yu, Rong Hao, Fanyu Kong, Xiaodong Liu
Summary: In this article, the first privacy-preserving face recognition protocol for the identification phase in intelligent security systems is proposed. The protocol utilizes the Householder matrix to protect user data privacy and supports privacy-preserving face recognition on semi-trusted edge servers. It achieves fast response for large-scale face recognition through edge computing and enhances efficiency through parallel computing based on multiple edge servers. The protocol maintains the same recognition accuracy as the original PCA-based face recognition algorithm and ensures privacy protection of user data through security analysis.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Jing Yao, Xiangyi Meng, Yifeng Zheng, Cong Wang
Summary: In this paper, a secure in-the-cloud middlebox system is designed to detect content-based similar flows in encrypted traffic dynamically. The system improves efficiency by adopting caching technique and compact index, as well as parallel algorithm and efficient enclave thread management mechanism. Extensive evaluations show that the overhead of the system compared to native processing is limited to 2.1x, and the system achieves up to 14.4x better computational efficiency compared to simply moving the target functionality to the SGX enclave. The secure system achieves a normalized similarity detection precision of about 90%.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal
Summary: In this paper, a new system is designed, implemented and evaluated to enable efficient outsourcing of decision tree inference to the cloud, improving the online end-to-end secure inference latency at the cloud and the local-side performance of the model provider. The paper presents a scheme that securely shifts most of the processing of the model provider to the cloud, reducing the model provider's performance complexities. Additionally, a scheme is devised to optimize the performance of secure decision tree inference at the cloud, specifically the communication round complexities. The new system achieves up to 8x better online end-to-end secure inference latency at the cloud side and brings the model provider up to 19x savings in communication and 18x savings in computation.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Artificial Intelligence
Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang
Summary: This article presents a study on privacy-preserving graph similarity search in cloud computing. The authors designed and implemented a novel system called PrigSim, which allows for storing and querying encrypted graph databases in the cloud while maintaining secure graph similarity search. Through the use of graph modeling, lightweight cryptography, and data encoding, PrigSim protects the confidentiality of data content associated with graphs and hides connections among vertices. Extensive experiments show that PrigSim's security design is accurate and introduces acceptable performance overheads.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
(2023)
Article
Computer Science, Information Systems
Wenjing Gao, Jia Yu
Summary: This paper introduces a parallel outsourcing mechanism based on two edge servers to accelerate the computation of matrix determinant. The computation task is divided into multiple subtasks using the matrix blocking technique, which are then assigned to the edge servers for parallel computation. Additionally, a privacy-preserving matrix transformation technique is proposed to protect data privacy. The correctness, privacy, and verifiability of the protocol are analyzed, and the performance advantage is demonstrated through simulation experiments.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Songlei Wang, Yifeng Zheng, Xiaohua Jia, Qian Wang, Cong Wang
Summary: Subgraph counting aims to count matching subgraphs of a given shape (e.g., triangle) in a large graph, which is important for social graph analytics applications. However, counting subgraphs in decentralized social graphs is challenging due to privacy concerns. To address this, MAGO is proposed as a system for secure subgraph counting. MAGO combines graph analytics, lightweight cryptography, and local differential privacy to allow users to securely contribute their local views for cloud-based subgraph counting.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)