Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021 - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

A secure three factor based authentication scheme for health care systems using IoT enabled devices

SS Sahoo, S Mohanty, B Majhi - Journal of Ambient Intelligence and …, 2021 - Springer
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …

Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications

S Belguith, N Kaaniche, M Hammoudeh… - Future Generation …, 2020 - Elsevier
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …

A bio-inspired privacy-preserving framework for healthcare systems

C Dhasarathan, M Kumar, AK Srivastava… - The Journal of …, 2021 - Springer
Wireless computing has revolutionized our life with the technological advancement from the
traditional networking into a new epoch for communication in ad hoc decorum. An energy …

A review on cybersecurity of cloud computing for supporting connected vehicle applications

MS Salek, SM Khan, M Rahman… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
In an Internet of Things (IoT) environment, cloud computing is emerging as a technologically
feasible and economically viable solution for supporting real-time and non-real-time …

Multiauthority access control with anonymous authentication for personal health record

L Zhang, Y Ye, Y Mu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
A personal health record (PHR) system is a smart health system that serves patients and
doctors. A PHR is usually stored in a cloud and managed by a semitrusted cloud provider …

Secret image sharing schemes: A comprehensive survey

S Saha, AK Chattopadhyay, AK Barman, A Nag… - IEEE …, 2023 - ieeexplore.ieee.org
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …

Privacy-preserving distributed data access control for CloudIoT

H Nasiraee, M Ashouri-Talouki - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Edge-Fog-Cloud interplay in the Internet-of-Things (IoT) leads to many exciting data-
sharing applications that use access control systems as primary requirements. To ensure a …

A flexible attribute based data access management scheme for sensor-cloud system

H Hong, Z Sun - Journal of Systems Architecture, 2021 - Elsevier
Sensor-cloud combines the merits of WSN with cloud computing and has been deployed in
many practical applications. Data security is the prerequisite for the implementation of a …