Security and privacy of smart cities: a survey, research issues and challenges
With recent advances of information and communication technology, smart city has been
emerged as a new paradigm to dynamically optimize the resources in cities and provide …
emerged as a new paradigm to dynamically optimize the resources in cities and provide …
Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review
Cloud computing is very popular because of its unique features such as scalability, elasticity,
on-demand service, and security. A large number of tasks are performed simultaneously in a …
on-demand service, and security. A large number of tasks are performed simultaneously in a …
Big data analytics in intelligent transportation systems: A survey
Big data is becoming a research focus in intelligent transportation systems (ITS), which can
be seen in many projects around the world. Intelligent transportation systems will produce a …
be seen in many projects around the world. Intelligent transportation systems will produce a …
Blockchain-based public auditing for big data in cloud storage
Cloud storage enables applications to efficiently manage their remote data but facing the
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …
Data security and privacy-preserving in edge computing paradigm: Survey and open issues
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …
edge of the network, the traditional centralized cloud computing model has come to a …
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …
information systems. Previous works generally assume a trusted third party to oversee the …
A survey on cloud computing security: Issues, threats, and solutions
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …
services to consumers with greater flexibility in a cost effective manner. While moving …
Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage
W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …
data sharing with others. Remote data integrity auditing is proposed to guarantee the …
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …
Exploring data security issues and solutions in cloud computing
Cloud computing is one of the fastest emerging technologies in computing. There are many
advantages as well few security issues in cloud computing. This paper explores the different …
advantages as well few security issues in cloud computing. This paper explores the different …