Block-secure: Blockchain based scheme for secure P2P cloud storage

J Li, J Wu, L Chen - Information Sciences, 2018 - Elsevier
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …

A task scheduling algorithm based on classification mining in fog computing environment

L Liu, D Qi, N Zhou, Y Wu - Wireless Communications and …, 2018 - Wiley Online Library
Fog computing (FC) is an emerging paradigm that extends computation, communication,
and storage facilities towards the edge of a network. In this heterogeneous and distributed …

Graph embedding‐based intelligent industrial decision for complex sewage treatment processes

Z Guo, Y Shen, AK Bashir, K Yu… - International Journal of …, 2022 - Wiley Online Library
Intelligent algorithms‐driven industrial decision systems have been a general demand for
modeling complex sewage treatment processes (STP). Existing researches modeled …

TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain

Y Zhang, RH Deng, J Shu, K Yang, D Zheng - IEEE Access, 2018 - ieeexplore.ieee.org
As a very attractive computing paradigm, cloud computing makes it possible for resource-
constrained users to enjoy cost-effective and flexible resources of diversity. Considering the …

Public auditing for shared cloud data with efficient and secure group management

H Tian, F Nan, H Jiang, CC Chang, J Ning, Y Huang - Information Sciences, 2019 - Elsevier
With increasing popularity of collaboration in clouds, shared data auditing has become an
important issue in cloud auditing field, and attracted extensive attention from the research …

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT

H Yan, Y Wang, C Jia, J Li, Y **ang… - Future Generation …, 2019 - Elsevier
Abstract The Internet of Things (IoT) has become one of critical parts in our daily life. As a
large number of smart things connecting to the Internet, terminals are vulnerable to various …

A cloud secure storage mechanism based on data dispersion and encryption

H Song, J Li, H Li - IEEE Access, 2021 - ieeexplore.ieee.org
Cloud storage service has shown its great power and wide popularity which provides
fundamental support for rapid development of cloud computing. However, due to …

An authenticated asymmetric group key agreement based on attribute encryption

Q Zhang, Y Gan, L Liu, X Wang, X Luo, Y Li - Journal of Network and …, 2018 - Elsevier
Secure communication among terminals in a group is necessary in Internet of Things (IoT).
Such as, the Vehicular Ad-hoc Network (VANET) is used to communicate with the vehicles to …

A reliability-aware approach for resource efficient virtual network function deployment

J Sun, G Zhu, G Sun, D Liao, Y Li, AK Sangaiah… - IEEE …, 2018 - ieeexplore.ieee.org
Network function virtualization (NFV) is a promising technique aimed at reducing capital
expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and …

Centralized duplicate removal video storage system with privacy preservation in IoT

H Yan, X Li, Y Wang, C Jia - Sensors, 2018 - mdpi.com
In recent years, the Internet of Things (IoT) has found wide application and attracted much
attention. Since most of the end-terminals in IoT have limited capabilities for storage and …