Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain

S Cao, G Zhang, P Liu, X Zhang, F Neri - Information Sciences, 2019 - Elsevier
The wide deployment of cloud-assisted electronic health (eHealth) systems has already
shown great benefits in managing electronic health records (EHRs) for both medical …

Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications

DCG Valadares, NC Will, J Caminha… - IEEE …, 2021 - ieeexplore.ieee.org
Trusted Execution Environments have been applied to improve data security in many distinct
application scenarios since they enable data processing in a separate and protected region …

An IoT-oriented data placement method with privacy preservation in cloud environment

X Xu, S Fu, L Qi, X Zhang, Q Liu, Q He, S Li - Journal of Network and …, 2018 - Elsevier
Abstract IoT (Internet of Things) devices generate huge amount of data which require rich
resources for data storage and processing. Cloud computing is one of the most popular …

A survey on privacy preservation in fog-enabled internet of things

K Sarwar, S Yongchareon, J Yu… - ACM Computing Surveys …, 2021 - dl.acm.org
Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical
challenges that need to be addressed before the full adoption of the IoT. Data privacy is one …

A lightweight machine learning-based authentication framework for smart IoT devices

P Punithavathi, S Geetha, M Karuppiah, SKH Islam… - Information …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is the next generation plethora of interconnected
devices that includes sensors, actuators, etc. and that can provide personalized services …

A cloud server energy consumption measurement system for heterogeneous cloud environments

W Lin, H Wang, Y Zhang, D Qi, JZ Wang, V Chang - Information Sciences, 2018 - Elsevier
With rapid development of cloud computing technologies and applications, the number and
scale of cloud data centers have grown exponentially in recent years. One of the major …

Enabling balanced data deduplication in mobile edge computing

R Luo, H **, Q He, S Wu, X **a - IEEE Transactions on Parallel …, 2023 - ieeexplore.ieee.org
In the mobile edge computing (MEC) environment, edge servers with storage and computing
resources are deployed at base stations within users' geographic proximity to extend the …

LOFS: A lightweight online file storage strategy for effective data deduplication at network edge

G Cheng, D Guo, L Luo, J **a… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Edge computing responds to users' requests with low latency by storing the relevant files at
the network edge. Various data deduplication technologies are currently employed at edge …

Secure lightweight key exchange using ECC for user-gateway paradigm

C Patel, N Doshi - IEEE Transactions on Computers, 2020 - ieeexplore.ieee.org
Internet of Things (IoT)-based services connect the user with sensing devices through
intermediary devices like a gateway. The authentication with secure key exchange assures …

Secure heterogeneous data deduplication via fog-assisted mobile crowdsensing in 5G-enabled IIoT

Y Zhang, CLP Chen - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
Mobile crowdsensing provides the data collection and sharing for the 5G-enabled industrial
Internet of Things. However, the redundant and duplicated heterogeneous sensing data …