Data security and privacy protection for cloud storage: A survey
P Yang, N **ong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …
transformation and world's digital economy are at the top of the tide. The continuous growth …
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
A secure authenticated and key exchange scheme for fog computing
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …
Human factor, a critical weak point in the information security of an organization's Internet of things
Abstract Internet of Things (IoT) presents opportunities for designing new technologies for
organizations. Many organizations are beginning to accept these technologies for their daily …
organizations. Many organizations are beginning to accept these technologies for their daily …
An authenticated key exchange protocol for multi-server architecture in 5G networks
Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the
amount of data, so multi-server distributed cloud computing has been widely used in various …
amount of data, so multi-server distributed cloud computing has been widely used in various …
Intelligent resource allocation management for vehicles network: An A3C learning approach
With the increasing demand of users for high-speed, low-delay and high-reliability services
in connected vehicles network, wireless networks with communication, caching and …
in connected vehicles network, wireless networks with communication, caching and …
Selecting hyper-parameters of Gaussian process regression based on non-inertial particle swarm optimization in Internet of Things
Gaussian process regression (GPR) is frequently used for uncertain measurement and
prediction of nonstationary time series in the Internet of Things data, nevertheless, the …
prediction of nonstationary time series in the Internet of Things data, nevertheless, the …
Heterogeneous signcryption with equality test for IIoT environment
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
[HTML][HTML] MLS-ABAC: Efficient multi-level security attribute-based access control scheme
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet
of Things, where various devices with low computational power and different security levels …
of Things, where various devices with low computational power and different security levels …