Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
Reinforcement learning-based physical cross-layer security and privacy in 6G
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
Blockchain-based public auditing for big data in cloud storage
Cloud storage enables applications to efficiently manage their remote data but facing the
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …
information systems. Previous works generally assume a trusted third party to oversee the …
Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage
W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …
data sharing with others. Remote data integrity auditing is proposed to guarantee the …
A blockchain-enabled deduplicatable data auditing mechanism for network storage services
Since network storage services achieve widespread adoption, security and performance
issues are becoming primary concerns, affecting the scalability of storage systems …
issues are becoming primary concerns, affecting the scalability of storage systems …
Auditing cache data integrity in the edge computing environment
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …
Edge computing and sensor-cloud: Overview, solutions, and directions
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …
Block-secure: Blockchain based scheme for secure P2P cloud storage
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …
To tackle with large-scale data, more and more applications choose to enlarge the storage …
An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks
The maturity of cloud computing, the Internet of Things technology, and intelligent
transportation system has promoted the rapid development of vehicular ad-hoc networks …
transportation system has promoted the rapid development of vehicular ad-hoc networks …