Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L **ao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

Blockchain-based public auditing for big data in cloud storage

J Li, J Wu, G Jiang, T Srikanthan - Information Processing & Management, 2020 - Elsevier
Cloud storage enables applications to efficiently manage their remote data but facing the
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

Q Zhao, S Chen, Z Liu, T Baker, Y Zhang - Information Processing & …, 2020 - Elsevier
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …

Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …

A blockchain-enabled deduplicatable data auditing mechanism for network storage services

Y Xu, C Zhang, G Wang, Z Qin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Since network storage services achieve widespread adoption, security and performance
issues are becoming primary concerns, affecting the scalability of storage systems …

Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H **, Y **ang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

Edge computing and sensor-cloud: Overview, solutions, and directions

T Wang, Y Liang, X Shen, X Zheng, A Mahmood… - ACM Computing …, 2023 - dl.acm.org
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …

Block-secure: Blockchain based scheme for secure P2P cloud storage

J Li, J Wu, L Chen - Information Sciences, 2018 - Elsevier
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …

An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks

M Ma, D He, H Wang, N Kumar… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The maturity of cloud computing, the Internet of Things technology, and intelligent
transportation system has promoted the rapid development of vehicular ad-hoc networks …