Filters








2,857 Hits in 4.5 sec

Lightweight Sharable and Traceable Secure Mobile Health System

Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li
2017 IEEE Transactions on Dependable and Secure Computing  
In this paper, we propose a Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient's mobile device to data users.  ...  However, efficient and scalable sharing of encrypted data has been a very challenging problem.  ...  Maintaining lightweight computation and efficient storage in mobile devices throughout the LiST system operations is our overriding design objective.  ... 
doi:10.1109/tdsc.2017.2729556 fatcat:74cfh2ury5gztm2r6r4hxo46e4

A Survey on Secure Data Analytics in Edge Computing

Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman
2019 IEEE Internet of Things Journal  
Hence, edge computing was introduced to perform data processing and storage in the edge of networks, which is closer to data sources than cloud computing, thus efficient and location-aware.  ...  In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing  ...  In addition, data integrity, identity privacy, traceability, mobility were not considered. But this scheme is efficient and suitable for resource-constrained devices.  ... 
doi:10.1109/jiot.2019.2897619 fatcat:fqmkiuse4vgafhiexe4ymqtx6m

A brief overview of intelligent mobility management for future wireless mobile networks

Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
2017 EURASIP Journal on Wireless Communications and Networking  
Finally, we also thank all the authors for their interests and for submitting their works for consideration for publication in this special issue.  ...  Acknowledgements We would like to thank the Editor-in-Chief, Prof. Dr.-Ing. Eduard Jorswieck, for providing us with the opportunity to prepare this special issue.  ...  In order to provide an efficient traceable access control in a mobile cloud computing environment, Guan et al., in "An efficient traceable access control scheme with reliable key delegation in mobile cloud  ... 
doi:10.1186/s13638-017-0972-6 fatcat:o523esfycfgqpmbo3n7livww64

Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT

Suhui Liu, Jiguo Yu, Chunqiang Hu, Mengmeng Li
2021 Wireless Communications and Mobile Computing  
Cloud-assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their data for high efficient management.  ...  Traditional public-key encryption can be used to guarantees data confidentiality, while it cannot achieve efficient data sharing.  ...  In the cloud-assisted IoT environment, data owners store private data in the shared cloud.  ... 
doi:10.1155/2021/6682580 doaj:368943909b5a4ce9bd762bbd78ce711a fatcat:vutxwv5mkjdrhkipdjuxxt4azm

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers.  ...  In this paper, to investigate the security and privacy of e-health systems, we identified major components of the modern e-health systems (i.e., e-health data, medical devices, medical networks and edge  ...  is proposed for resource-constrained devices in mobile cloud computing Bilinear pairings used in the proposed scheme pose a high cost that hinders efficiency [118] -Unauthorized access -Data  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

Security and Privacy Challenges for Internet-of-Things and Fog Computing

Ximeng Liu, Yang Yang, Kim-Kwang Raymond Choo, Huaqun Wang
2018 Wireless Communications and Mobile Computing  
Li et al., entitled "Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud", presented a verifiable and traceable CP-ABE scheme in eHealth cloud.  ...  For the task allocation problem in mobile devices, the paper by W.  ... 
doi:10.1155/2018/9373961 fatcat:dtklqr7jtze77kap57kckntmmy

Security and Privacy Based Data Sharing in Cloud Computing

Dr.Prasanna Kumar.R, Porselvan G, Prem Kumar S, Robinlash F
2018 International Journal of Innovative Research in Engineering & Management  
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services.  ...  In order to provide security to the shared secret data, the cryptographic techniques are usually applied. However, the data cryptographic key is protected by the two factors.  ...  We have seen the possible methods and solutions for implementing the security and privacy in the big data analytics.  ... 
doi:10.21276/ijirem.2018.5.1.9 fatcat:w4ieubijjvaybjrrj22fgtq3p4

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
2021 IEEE Access  
Mobile-cloud architecture is emerging as 5G /6G mobile IoT devices are generating large volumes of data which need cloud infrastructure to process.  ...  and privacy protection. 5G/6G mobile applications, the smart Internet of Things (IoT) devices, big data applications, and cloud systems are developing to better meet new requirements.  ...  The article ''Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling,'' by Jamal et al., proposes an agent-based ABE access control method for the mobile cloud environment  ... 
doi:10.1109/access.2021.3075818 fatcat:7t3tgqarsndc5dq2gulr7hapzi

Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks

Xueyan Liu, Yukun Luo, Xiaotao Yang
2020 Mobile Information Systems  
In this study, an efficient scheme is proposed to tackle the above defaults and offer two-way anonymity of data owner and data user by introducing a pseudoidentity.  ...  The growing need to store, share, and manage medical and health records has resulted in electronic medical health sharing system (mHealth), which provides intelligent medical treatment for people.  ...  Introduction Given the rapid progress of cloud computing and mobile communication technology with ubiquitous mobile intelligent devices, the electronic medical health sharing system (mHealth) has been  ... 
doi:10.1155/2020/3984048 fatcat:4o7uhk4mwnhyfdi35326t5wqim

A Review on Cloud Data Security and its Mitigation Techniques

K. Selvamani, S. Jayanthi
2015 Procedia Computer Science  
Cloud providers offer several storage services for their users in efficient manner.  ...  Cloud users are allowed to store their data in cloud server using cloud storage and reduce the burden of storing and retrieving in local machine.  ...  Introduction In the era of Cloud Computing, there are several opportunities that enables data stored remotely to be temporarily cached on desktop computers, mobile phones or other internet devices.  ... 
doi:10.1016/j.procs.2015.04.192 fatcat:tawpw3p2izhc3elenwn5c23aai

Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud

Qi Li, Hongbo Zhu, Zuobin Ying, Tao Zhang
2018 Wireless Communications and Mobile Computing  
In this work, we present a verifiable and traceable CP-ABE scheme (VTCP-ABE) in eHealth cloud, which simultaneously supports the properties of verifiable outsourced decryption and white-box traceability  ...  The formal security proof and extensive simulations illustrate that our VTCP-ABE scheme is secure, efficient, and practical.  ...  [7] presented a PHR data sharing scheme for cloud storage applications in the multi-authority settings. In both [7, 13] , the correctness of returned PDC is not guaranteed. Lai et al.  ... 
doi:10.1155/2018/1701675 fatcat:el73dpzllbc57olnihip3vr7fu

Overview of Edge Computing in the Agricultural Internet of Things: Key Technologies, Applications, Challenges

Xihai Zhang, Zhanyuan Cao, Wenbin Dong
2020 IEEE Access  
Secondly, Edge computing can maintain efficient coordination with cloud computing and share cloud computing tasks.  ...  For AI, Edge computing can perform data preprocessing and share the computing of the cloud server and storage models.  ... 
doi:10.1109/access.2020.3013005 fatcat:ppg4hv4usvdq7ofayqblibb32e

Guest Editorial: Special Issue on Blockchain and Edge Computing Techniques for Emerging IoT Applications

Victor C. M. Leung, Xiaofei Wang, F. Richard Yu, Dusit Niyato, Tarik Taleb, Sangheon Pack
2021 IEEE Internet of Things Journal  
Focusing on the research of social-aware cloud computing, cooperative cell caching, and mobile traffic offloading, he has authored over 100 technical papers in  ...  The article by Liu et al., titled "Blockchain-enabled secure data sharing scheme in mobile-edge computing: An asynchronous advantage actor-critic learning approach" proposes a secure data sharing scheme  ...  . 3) Specific Applications of Blockchain-Based Edge Computing: In the article "EEDTO: An energy-efficient dynamic task offloading algorithm for blockchain-enabled IoT-edge-cloud orchestrated computing"  ... 
doi:10.1109/jiot.2021.3050050 fatcat:rux57gjppjdqla556myxnvp4ve

Privacy-Preserving Internet of Things: Techniques and Applications

2019 International Journal of Engineering and Advanced Technology  
Privacy has become an imperative term in the recent technology developments. Lots of data are being collected through every digital activity of users.  ...  A large number of techniques and approaches have been implemented and used in different IoT based applications such as cloud computing based IoT, fog computing based IoT, blockchain based IoT and trajectory  ...  IoT devices generate large amount of data and it can be efficiently accommodated in a cloud platform.  ... 
doi:10.35940/ijeat.f8830.088619 fatcat:onkuoapbkzhdtggza6ib7jj5ka

Blockchain for 5G and Beyond Networks: A State of the Art Survey [article]

Dinh C Nguyen, Pubudu N Pathirana, Ming Ding, Aruna Seneviratne
2019 arXiv   pre-print
Our key focus is on the discussions on the potential of blockchain for enabling key 5G technologies, including cloud/edge computing, Software Defined Networks, Network Function Virtualization, Network  ...  The 5G technologies target to support diverse vertical applications by connecting heterogeneous devices and machines with drastic improvements in terms of high quality of service, increased network capacity  ...  For example, the work in [136] employs blockchain to build a secure content catching and sharing scheme among mobile devices for D2D networks.  ... 
arXiv:1912.05062v1 fatcat:ecitoeu5ijh6flblgm74fpvmz4
« Previous Showing results 1 — 15 out of 2,857 results