Security and privacy of smart cities: a survey, research issues and challenges

M Sookhak, H Tang, Y He, FR Yu - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
With recent advances of information and communication technology, smart city has been
emerged as a new paradigm to dynamically optimize the resources in cities and provide …

Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review

R Ghafari, FH Kabutarkhani, N Mansouri - Cluster Computing, 2022 - Springer
Cloud computing is very popular because of its unique features such as scalability, elasticity,
on-demand service, and security. A large number of tasks are performed simultaneously in a …

Big data analytics in intelligent transportation systems: A survey

L Zhu, FR Yu, Y Wang, B Ning… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Big data is becoming a research focus in intelligent transportation systems (ITS), which can
be seen in many projects around the world. Intelligent transportation systems will produce a …

Blockchain-based public auditing for big data in cloud storage

J Li, J Wu, G Jiang, T Srikanthan - Information Processing & Management, 2020 - Elsevier
Cloud storage enables applications to efficiently manage their remote data but facing the
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

Q Zhao, S Chen, Z Liu, T Baker, Y Zhang - Information Processing & …, 2020 - Elsevier
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …

Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage

Y Yu, MH Au, G Ateniese, X Huang… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …

Exploring data security issues and solutions in cloud computing

PR Kumar, PH Raj, P Jelciana - Procedia Computer Science, 2018 - Elsevier
Cloud computing is one of the fastest emerging technologies in computing. There are many
advantages as well few security issues in cloud computing. This paper explores the different …