Welcome to Security Subgroup of BBCR Lab

Security and Privacy in Cloud Computing

Cloud Computing

Cloud computing, born from billions of dollars industry investment, has significantly changed the model of modern IT industry. Cloud computing enables users to access a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) provisioned by cloud service providers (CPSs) in a pay-as-you-go business model. Security and privacy concerns are still the biggest barrier for users to adopt cloud services, although many security strategies and approaches have been developed by cloud service providers (e.g., IBM, Amazon, Microsoft, Google, etc.) to guarantee their cloud platforms or services. The main reason is that users lose the physical control of their data, while cloud service providers may not be fully trusted. In such a scenario, how to guarantee security and privacy of cloud data is a challenging and promising problem. Although many works have been proposed for cloud security and privacy from both academia and industrial community in recent years, there are still many challenging issues and problems that need extensive research.

Publications

Journal PapersS

  1. D.M. Shila, W. Shen, Y. Cheng, X. Tian and X. Shen, "AMCloud: Towards a Secure Autonomic Mobile Ad Hoc Cloud Computing System", IEEE Wireless Communications, Vol. 24, No. 2, pp. 74-81, 2017.
  2. K. Yang, Q. Han, H. Li, K. Zheng, Z. Su and X. Shen, "An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy", IEEE Internet of Things Journal, Vol. 4, No. 2, pp. 563-571, 2017.
  3. K. Yang, Z. Liu, X. Jia and X. Shen, "Time-domain Attribute-based Access Control for Cloud-based Video Content Sharing: A Cryptographic Approach ", IEEE Trans. on Multimedia, Vol. 18, No. 5, pp. 940-950, 2016.
  4. H. Li, Y. Yang, X. Liang, T.H. Luan, L. Zhou, and X. Shen, "Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data", IEEE Trans. on Dependable and Secure Computing, Vol. 13, No. 3, pp. 312-325, 2016.
  5. H. Li, D. Liu, Y. Dai, T.H. Luan and X. Shen, " Enabling Efficient Multi-keyword Ranked Search over Encrypted Mobile Cloud Data through Blind Storage ", IEEE Trans. on Emerging Topics in Computing, Vol.3, No.1, pp.127-138, 2015.
  6. T.H. Luan, R. Lu, X. Shen, and F. Bai, "Social on the Road: Enabling Secure and Efficient Social Networking on Highways", IEEE Wireless Communications, Vol. 22, No. 1, pp. 44-51, 2015.
  7. K. Yang, K. Zhang, J. Ren, and X. Shen, "Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities", IEEE Communications Magazine, Vol. 53, No. 8, pp. 75-81, 2015.
  8. J. Ren, Y. Zhang, K. Zhang, and X. Shen, "Exploiting Mobile Crowdsourcing for Pervasive Cloud Services: Challenges and Solutions", IEEE Communications Magazine, Vol. 53, No. 4, pp. 98-105, 2015.
  9. K. Yang, X. Jia and K. Ren, "Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud", IEEE Trans. on Parallel and Distributed Systems, Vol. 16, No. 12, pp. 3461-3470, 2015.
  10. K. Zhang, X. Liang, M. Bauray, R. Lu, and X. Shen, "PHDA: A Priority Based Health Data Aggregation with Privacy Preservation for Cloud Assisted WBANs", Information Sciences (Elsevier), Vol. 284, pp. 130 - 141, Nov. 2014.
  11. K. Yang and X. Jia, "Expressive, Efficient and Revocable Data Access Control for Multi-Authority Cloud Storage", IEEE Trans. on Parallel and Distributed Systems, Vol 25, Issue 7, pp. 1735-1744, 2014.
  12. K. Yang, X. Jia et al., "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems", IEEE Trans. on Information Forensics and Security, Vol 8, Issue 11, pp 1790-1801, 2013.
  13. K. Yang and X. Jia, "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing", IEEE Trans. on Parallel and Distributed Systems, Vol 24, Issue 9, pp 1717-1726,September 2013.
  14. K. Yang and X. Jia, "Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities", World Wide Web, Vol 15, Issue 4, pp 409-428, July 2012.
  15. M. Barua, X. Liang, R. Lu, and X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in Cloud Computing", Int. J. of Security and Networks (IJSN), Vol. 6, Nos. 2/3, pp. 67-76, 2011.

Conference Papers

  1. J. Ni, X. Lin, K. Zhang, Y. Yu and X. Shen, "Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage", Proc. IEEE/CIC ICCC'16, Chengdu, China, July 27-29, 2016.
  2. K. Yang, X. Jia, K. Ren, R. Xie and L. Huang, "Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud", Proc. of IEEE INFOCOM'14 (Acceptance Rate: 19.4%), pp. 2013-2021, Toronto, Canada, 2014.
  3. M. Barua, R. Lu and X. Shen, "SPS: Secure Personal Health Information Sharing with Patient-centric Access Control in Cloud Computing", Proc. of IEEE GLOBECOM'13, Atlanta, GA, USA, Dec. 9-13, 2013.
  4. H. Liang, D. Huang, L. X. Cai, X. Shen, and D. Peng, "Resource Allocation for Security Services in Mobile Cloud Computing", Proc. of IEEE INFOCOM'11-M2MCN, Shanghai, China, April 10-15, 2011.
  5. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing", Proc. of ACM ASIACCS'10 (acceptance rate: 15%), Beijing, China, April 13-16, 2010.

Books/Chapters

  1. K. Yang and X. Jia, "Security for Cloud Storage Systems", SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN:978-1-4614-7872-0).
Note: Downloadable papers HERE are under copyright protection. Please abide by all applicable copyright laws!