A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Private machine learning classification based on fully homomorphic encryption

X Sun, P Zhang, JK Liu, J Yu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Machine learning classification is an useful tool for trend prediction by analyzing big data. As
supporting homomorphic operations over encrypted data without decryption, fully …

Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments

A Karati, SKH Islam, GP Biswas… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in
the context of the industry as digitization becomes a business priority for various …

Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario

M Ma, G Shi, F Li - IEEE access, 2019 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoT) and the explosive growth of valuable
data produced by user equipment have led to strong demand for access control, especially …

[HTML][HTML] An attribute-based collaborative access control scheme using blockchain for IoT devices

Y Zhang, B Li, B Liu, J Wu, Y Wang, X Yang - Electronics, 2020 - mdpi.com
The Internet of Things (IoT) benefits our lives by integrating physical devices to the real
world and offers a crucial internet infrastructure for future civilization. Because IoT devices …

An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA

B Prabhu Kavin, S Ganapathy, U Kanimozhi… - Wireless Personal …, 2020 - Springer
In this paper, we propose an enhanced security framework for securing the cloud users data
in the cloud environment. This new security framework consists of access control …

A secure cloud-assisted urban data sharing framework for ubiquitous-cities

J Shen, D Liu, J Shen, Q Liu, X Sun - Pervasive and mobile Computing, 2017 - Elsevier
With the accelerated process of urbanization, more and more people tend to live in cities. In
order to deal with the big data that are generated by citizens and public city departments …

Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT

RH Jhaveri, NM Patel, Y Zhong, AK Sangaiah - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things

Y Zhang, RH Deng, G Han, D Zheng - Journal of Network and Computer …, 2018 - Elsevier
With the rapid technological advancements in the Internet of Things (IoT), wireless
communication and cloud computing, smart health is expected to enable comprehensive …