Industrial internet of things ecosystems security and digital forensics: achievements, open challenges, and future directions

VR Kebande, AI Awad - ACM Computing Surveys, 2024 - dl.acm.org
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …

[HTML][HTML] An overview of privacy dimensions on the industrial Internet of Things (IIoT)

V Demertzi, S Demertzis, K Demertzis - Algorithms, 2023 - mdpi.com
The rapid advancements in technology have given rise to groundbreaking solutions and
practical applications in the field of the Industrial Internet of Things (IIoT). These …

A blockchain-based shamir's threshold cryptography scheme for data protection in industrial internet of things settings

K Yu, L Tan, C Yang, KKR Choo… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT), a typical Internet of Things (IoT) application,
integrates the global industrial system with other advanced computing, analysis, and …

A personalized privacy protection framework for mobile crowdsensing in IIoT

J **ong, R Ma, L Chen, Y Tian, Q Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent
data collection and processing paradigm of the industrial Internet of Things, has provided a …

Privacy-preserving attribute-based keyword search in shared multi-owner setting

Y Miao, X Liu, KKR Choo, RH Deng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …

Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

Achieving privacy-preserving DSSE for intelligent IoT healthcare system

Y Liu, J Yu, J Fan, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As the product of combining Internet of Things (IoT), cloud computing, and traditional
healthcare, Intelligent IoT Healthcare (IIoTH) brings us a lot of convenience, meanwhile …

Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices

Y Lu, J Li - IEEE Transactions on Mobile Computing, 2021 - ieeexplore.ieee.org
Cloud storage services have grown extensively in recent years. For security and privacy
purposes, sensitive data need to be outsourced to clouds in encrypted form. Searchable …

Lightweight searchable encryption protocol for industrial internet of things

K Zhang, J Long, X Wang, HN Dai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …