Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data integrity in smart city

MS Rahman, MAP Chamikara, I Khalil… - Journal of Industrial …, 2022 - Elsevier
We propose a hierarchical blockchain-based platform for ensuring the integrity of smart city
Internet-of-Things (IoT) data and blockchain interoperability in this paper. The well-defined …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks

K Zhang, Y Mao, S Leng, Q Zhao, L Li, X Peng… - IEEE …, 2016 - ieeexplore.ieee.org
Mobile edge computing (MEC) is a promising paradigm to provide cloud-computing
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …

A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things

X Li, J Niu, MZA Bhuiyan, F Wu… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …

Novel visual and statistical image features for microblogs news verification

Z **, J Cao, Y Zhang, J Zhou… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Microblog has been a popular media platform for reporting and propagating news. However,
fake news spreading on microblogs would severely jeopardize its public credibility. To …

Security in Internet of Things: issues, challenges, taxonomy, and architecture

V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …

Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement

Z Fu, X Wu, C Guan, X Sun… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …

Enabling personalized search over encrypted outsourced data with efficiency improvement

Z Fu, K Ren, J Shu, X Sun… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
In cloud computing, searchable encryption scheme over outsourced data is a hot research
field. However, most existing works on encrypted search over outsourced cloud data follow …