Enhancing privacy and availability for data clustering in intelligent electrical service of IoT

J **ong, J Ren, L Chen, Z Yao, M Lin… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The ever-growing demand for electrical energy of sensing devices in the Internet of Things
(IoT) has led to generating large amounts of electricity consumption data. Electricity service …

A secure authorized deduplication scheme for cloud data based on blockchain

G Zhang, Z Yang, H **e, W Liu - Information Processing & Management, 2021 - Elsevier
Deduplication scheme based on convergent encryption (CE) is widely-used in cloud storage
system to eliminate redundant data. However, the adversaries can obtain the data by the …

Lightweight multifactor authentication scheme for nextgen cellular networks

AS Khan, Y Javed, RM Saqib, Z Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …

Secure heterogeneous data deduplication via fog-assisted mobile crowdsensing in 5G-enabled IIoT

Y Zhang, CLP Chen - IEEE transactions on industrial …, 2021 - ieeexplore.ieee.org
Mobile crowdsensing provides the data collection and sharing for the 5G-enabled industrial
Internet of Things. However, the redundant and duplicated heterogeneous sensing data …

(a, k)-Anonymous scheme for privacy-preserving data collection in IoT-based healthcare services systems

H Li, F Guo, W Zhang, J Wang, J **ng - Journal of Medical Systems, 2018 - Springer
The widely use of IoT technologies in healthcare services has pushed forward medical
intelligence level of services. However, it also brings potential privacy threat to the data …

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis

J **ong, L Chen, MZA Bhuiyan, C Cao, M Wang… - Future Generation …, 2020 - Elsevier
With the widespread adoption of mobile devices in various IoT services, an increasing
amount of personal sensitive data are stored in IoT devices using flash memory as storage …

Privacy-preserving edge-assisted image retrieval and classification in IoT

X Li, J Li, S Yiu, C Gao, J **ong - Frontiers of Computer Science, 2019 - Springer
Abstract Internet of Things (IoT) has drawn much attention in recent years. However, the
image data captured by IoT terminal devices are closely related to users' personal …

Achieving incentive, security, and scalable privacy protection in mobile crowdsensing services

J **ong, R Ma, L Chen, Y Tian, L Lin… - … and mobile computing, 2018 - Wiley Online Library
Mobile crowdsensing as a novel service schema of the Internet of Things (IoT) provides an
innovative way to implement ubiquitous social sensing. How to establish an effective …

Secure encrypted data with authorized deduplication in cloud

J **ong, Y Zhang, S Tang, X Liu, Z Yao - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based
on convergent encryption and the role re-encryption algorithm to prevent the privacy data …

Survey on techniques for authorized deduplication of encrypted data in cloud

MB Waghmare, SV Padwekar - 2020 International Conference …, 2020 - ieeexplore.ieee.org
Cloud computing technology is on-demand nowadays. Number of files created, stored and
processed in cloud is increasing per day. The amount of space, processing power …