A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

Blockchain-based publicly verifiable data deletion scheme for cloud storage

C Yang, X Chen, Y **ang - Journal of Network and Computer Applications, 2018 - Elsevier
With the rapid development of cloud storage, more and more data owners store their data on
the remote cloud, that can reduce data owners' overhead because the cloud server …

[HTML][HTML] Security and privacy issues of physical objects in the IoT: Challenges and opportunities

X Yao, F Farha, R Li, I Psychoula, L Chen… - Digital Communications …, 2021 - Elsevier
Abstract In the Internet of Things (IoT), security and privacy issues of physical objects are
crucial to the related applications. In order to clarify the complicated security and privacy …

Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry

M Qiu, K Gai, B Thuraisingham, L Tao… - Future generation …, 2018 - Elsevier
As one of the most significant issues in the financial industry, customers' privacy information
protection has been considered a challenging research over years. The constant …

Provable data transfer from provable data possession and deletion in cloud storage

L Xue, J Ni, Y Li, J Shen - Computer Standards & Interfaces, 2017 - Elsevier
With the rapid development of cloud storage, an increasing number of users prefer to store
their data on the remote cloud to reduce the burden of maintaining the data by themselves …

Trust evaluation model of cloud user based on behavior data

Z Chen, L Tian, C Lin - International Journal of Distributed …, 2018 - journals.sagepub.com
In the process of using the cloud platform, how to ensure the safety of users is a matter we
must concern. The user authentication can provide a certain degree of security, but when the …

CP‐ABE‐Based Secure and Verifiable Data Deletion in Cloud

J Ma, M Wang, J **ong, Y Hu - Security and Communication …, 2021 - Wiley Online Library
Cloud data, the ownership of which is separated from their administration, usually contain
users' private information, especially in the fifth‐generation mobile communication (5G) …

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis

J **ong, L Chen, MZA Bhuiyan, C Cao, M Wang… - Future Generation …, 2020 - Elsevier
With the widespread adoption of mobile devices in various IoT services, an increasing
amount of personal sensitive data are stored in IoT devices using flash memory as storage …

Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT

J Hao, J Liu, W Wu, F Tang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The emerging cloud-based Internet of Things (IoT) paradigm enables IoT devices to directly
upload their collected data to the remote cloud and allows data owners (DOs) to …