[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022‏ - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

Detecting node replication attacks in wireless sensor networks: a survey

WT Zhu, J Zhou, RH Deng, F Bao - Journal of Network and Computer …, 2012‏ - Elsevier
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …

ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs

J Li, H Lu, M Guizani - IEEE transactions on parallel and …, 2014‏ - ieeexplore.ieee.org
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both
inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be …

Secure and efficient data transmission for cluster-based wireless sensor networks

H Lu, J Li, M Guizani - IEEE transactions on parallel and …, 2013‏ - ieeexplore.ieee.org
Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering
is an effective and practical way to enhance the system performance of WSNs. In this paper …

Secure and efficient data communication protocol for wireless body area networks

C Hu, H Li, Y Huo, T **ang… - IEEE Transactions on multi …, 2016‏ - ieeexplore.ieee.org
Wireless Body Area Networks (WBANs) are expected to play a major role in the field of
patient-health monitoring in the near future, which gains tremendous attention amongst …

CPPA-D: Efficient conditional privacy-preserving authentication scheme with double-insurance in VANETs

W **ong, R Wang, Y Wang, F Zhou… - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
With the establishment of the intelligent transportation system (ITS), the vehicular ad hoc
networks (VANETs) play a significant role for improving traffic safety and efficiency. In order …

Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry

LA Ajao, J Agajo, EA Adedokun, L Karngong - J, 2019‏ - mdpi.com
This research work proposes a method for the securing and monitoring of petroleum product
distribution records in a decentralized ledger database using blockchain technology. The …

Body area network security: a fuzzy attribute-based signcryption scheme

C Hu, N Zhang, H Li, X Cheng… - IEEE journal on selected …, 2013‏ - ieeexplore.ieee.org
Body Area Networks (BANs) are expected to play a major role in the field of patient-health
monitoring in the near future. While it is vital to support secure BAN access to address the …

Privacy-preserving public auditing protocol for low-performance end devices in cloud

J Li, L Zhang, JK Liu, H Qian… - IEEE Transactions on …, 2016‏ - ieeexplore.ieee.org
Cloud storage provides tremendous storage resources for both individual and enterprise
users. In a cloud storage system, the data owned by a user are no longer possessed locally …

Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT

H **ong, Y Wu, C **, S Kumari - IEEE Internet of Things …, 2020‏ - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is expected to provide a promising opportunity to
revolutionize the production operation of the existing industrial systems by leveraging smart …