A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Lightweight Sharable and Traceable Secure Mobile Health System
2017
IEEE Transactions on Dependable and Secure Computing
In this paper, we propose a Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient's mobile device to data users. ...
However, efficient and scalable sharing of encrypted data has been a very challenging problem. ...
Maintaining lightweight computation and efficient storage in mobile devices throughout the LiST system operations is our overriding design objective. ...
doi:10.1109/tdsc.2017.2729556
fatcat:74cfh2ury5gztm2r6r4hxo46e4
A Survey on Secure Data Analytics in Edge Computing
2019
IEEE Internet of Things Journal
Hence, edge computing was introduced to perform data processing and storage in the edge of networks, which is closer to data sources than cloud computing, thus efficient and location-aware. ...
In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing ...
In addition, data integrity, identity privacy, traceability, mobility were not considered. But this scheme is efficient and suitable for resource-constrained devices. ...
doi:10.1109/jiot.2019.2897619
fatcat:fqmkiuse4vgafhiexe4ymqtx6m
A brief overview of intelligent mobility management for future wireless mobile networks
2017
EURASIP Journal on Wireless Communications and Networking
Finally, we also thank all the authors for their interests and for submitting their works for consideration for publication in this special issue. ...
Acknowledgements We would like to thank the Editor-in-Chief, Prof. Dr.-Ing. Eduard Jorswieck, for providing us with the opportunity to prepare this special issue. ...
In order to provide an efficient traceable access control in a mobile cloud computing environment, Guan et al., in "An efficient traceable access control scheme with reliable key delegation in mobile cloud ...
doi:10.1186/s13638-017-0972-6
fatcat:o523esfycfgqpmbo3n7livww64
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
2021
Wireless Communications and Mobile Computing
Cloud-assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their data for high efficient management. ...
Traditional public-key encryption can be used to guarantees data confidentiality, while it cannot achieve efficient data sharing. ...
In the cloud-assisted IoT environment, data owners store private data in the shared cloud. ...
doi:10.1155/2021/6682580
doaj:368943909b5a4ce9bd762bbd78ce711a
fatcat:vutxwv5mkjdrhkipdjuxxt4azm
A Comprehensive Survey on Security and Privacy for Electronic Health Data
2021
International Journal of Environmental Research and Public Health
In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers. ...
In this paper, to investigate the security and privacy of e-health systems, we identified major components of the modern e-health systems (i.e., e-health data, medical devices, medical networks and edge ...
is proposed
for resource-constrained
devices in mobile cloud
computing
Bilinear pairings used in
the proposed scheme
pose a high cost that
hinders efficiency
[118]
-Unauthorized access
-Data ...
doi:10.3390/ijerph18189668
pmid:34574593
fatcat:nx7rjvy7tfczjbgmmpqgyiajuu
Security and Privacy Challenges for Internet-of-Things and Fog Computing
2018
Wireless Communications and Mobile Computing
Li et al., entitled "Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud", presented a verifiable and traceable CP-ABE scheme in eHealth cloud. ...
For the task allocation problem in mobile devices, the paper by W. ...
doi:10.1155/2018/9373961
fatcat:dtklqr7jtze77kap57kckntmmy
Security and Privacy Based Data Sharing in Cloud Computing
2018
International Journal of Innovative Research in Engineering & Management
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services. ...
In order to provide security to the shared secret data, the cryptographic techniques are usually applied. However, the data cryptographic key is protected by the two factors. ...
We have seen the possible methods and solutions for implementing the security and privacy in the big data analytics. ...
doi:10.21276/ijirem.2018.5.1.9
fatcat:w4ieubijjvaybjrrj22fgtq3p4
IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments
2021
IEEE Access
Mobile-cloud architecture is emerging as 5G /6G mobile IoT devices are generating large volumes of data which need cloud infrastructure to process. ...
and privacy protection. 5G/6G mobile applications, the smart Internet of Things (IoT) devices, big data applications, and cloud systems are developing to better meet new requirements. ...
The article ''Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling,'' by Jamal et al., proposes an agent-based ABE access control method for the mobile cloud environment ...
doi:10.1109/access.2021.3075818
fatcat:7t3tgqarsndc5dq2gulr7hapzi
Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks
2020
Mobile Information Systems
In this study, an efficient scheme is proposed to tackle the above defaults and offer two-way anonymity of data owner and data user by introducing a pseudoidentity. ...
The growing need to store, share, and manage medical and health records has resulted in electronic medical health sharing system (mHealth), which provides intelligent medical treatment for people. ...
Introduction Given the rapid progress of cloud computing and mobile communication technology with ubiquitous mobile intelligent devices, the electronic medical health sharing system (mHealth) has been ...
doi:10.1155/2020/3984048
fatcat:4o7uhk4mwnhyfdi35326t5wqim
A Review on Cloud Data Security and its Mitigation Techniques
2015
Procedia Computer Science
Cloud providers offer several storage services for their users in efficient manner. ...
Cloud users are allowed to store their data in cloud server using cloud storage and reduce the burden of storing and retrieving in local machine. ...
Introduction In the era of Cloud Computing, there are several opportunities that enables data stored remotely to be temporarily cached on desktop computers, mobile phones or other internet devices. ...
doi:10.1016/j.procs.2015.04.192
fatcat:tawpw3p2izhc3elenwn5c23aai
Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
2018
Wireless Communications and Mobile Computing
In this work, we present a verifiable and traceable CP-ABE scheme (VTCP-ABE) in eHealth cloud, which simultaneously supports the properties of verifiable outsourced decryption and white-box traceability ...
The formal security proof and extensive simulations illustrate that our VTCP-ABE scheme is secure, efficient, and practical. ...
[7] presented a PHR data sharing scheme for cloud storage applications in the multi-authority settings. In both [7, 13] , the correctness of returned PDC is not guaranteed. Lai et al. ...
doi:10.1155/2018/1701675
fatcat:el73dpzllbc57olnihip3vr7fu
Overview of Edge Computing in the Agricultural Internet of Things: Key Technologies, Applications, Challenges
2020
IEEE Access
Secondly, Edge computing can maintain efficient coordination with cloud computing and share cloud computing tasks. ...
For AI, Edge computing can perform data preprocessing and share the computing of the cloud server and storage models. ...
doi:10.1109/access.2020.3013005
fatcat:ppg4hv4usvdq7ofayqblibb32e
Guest Editorial: Special Issue on Blockchain and Edge Computing Techniques for Emerging IoT Applications
2021
IEEE Internet of Things Journal
Focusing on the research of social-aware cloud computing, cooperative cell caching, and mobile traffic offloading, he has authored over 100 technical papers in ...
The article by Liu et al., titled "Blockchain-enabled secure data sharing scheme in mobile-edge computing: An asynchronous advantage actor-critic learning approach" proposes a secure data sharing scheme ...
. 3) Specific Applications of Blockchain-Based Edge Computing: In the article "EEDTO: An energy-efficient dynamic task offloading algorithm for blockchain-enabled IoT-edge-cloud orchestrated computing" ...
doi:10.1109/jiot.2021.3050050
fatcat:rux57gjppjdqla556myxnvp4ve
Privacy-Preserving Internet of Things: Techniques and Applications
2019
International Journal of Engineering and Advanced Technology
Privacy has become an imperative term in the recent technology developments. Lots of data are being collected through every digital activity of users. ...
A large number of techniques and approaches have been implemented and used in different IoT based applications such as cloud computing based IoT, fog computing based IoT, blockchain based IoT and trajectory ...
IoT devices generate large amount of data and it can be efficiently accommodated in a cloud platform. ...
doi:10.35940/ijeat.f8830.088619
fatcat:onkuoapbkzhdtggza6ib7jj5ka
Blockchain for 5G and Beyond Networks: A State of the Art Survey
[article]
2019
arXiv
pre-print
Our key focus is on the discussions on the potential of blockchain for enabling key 5G technologies, including cloud/edge computing, Software Defined Networks, Network Function Virtualization, Network ...
The 5G technologies target to support diverse vertical applications by connecting heterogeneous devices and machines with drastic improvements in terms of high quality of service, increased network capacity ...
For example, the work in [136] employs blockchain to build a secure content catching and sharing scheme among mobile devices for D2D networks. ...
arXiv:1912.05062v1
fatcat:ecitoeu5ijh6flblgm74fpvmz4
« Previous
Showing results 1 — 15 out of 2,857 results