Filters








17,587 Hits in 4.1 sec

5G security: Analysis of threats and solutions

Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei Gurtov
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ynj2zwfg5jdk7lxl2jjruobnnu" style="color: black;">2017 IEEE Conference on Standards for Communications and Networking (CSCN)</a> </i> &nbsp;
The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G.  ...  However, there are pressing security challenges in these technologies besides the growing concerns for user privacy.  ...  protection, in-device spatial cloaking mechanism for privacy protection as well as MobiCloud which is a secure cloud framework for mobile computing and communication [50] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cscn.2017.8088621">doi:10.1109/cscn.2017.8088621</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cscn/AhmadKLOYG17.html">dblp:conf/cscn/AhmadKLOYG17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kdc66olm4nf4xdz4i2qq6g2fsa">fatcat:kdc66olm4nf4xdz4i2qq6g2fsa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428043524/http://jultika.oulu.fi/files/nbnfi-fe2018073033104.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/71/1d/711d46bfd83d38fb19ad88adc9cce0436989039b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cscn.2017.8088621"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A new secure proxy-based distributed virtual machines management in mobile cloud computing

Boubakeur Annane, Osman Ghazali, Adel Alti
<span title="2019-07-24">2019</span> <i title="Association of Computer, Communication and Education for National Triumph Social and Welfare Society (ACCENTS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/h6wni7yfjratfglwchnpmbf2iu" style="color: black;">International Journal of Advanced Computer Research</a> </i> &nbsp;
The purpose of this paper is to present a new security proxy-based approach that contains three policies based on secured hashed Diffie-Hellman keys for user access control and VM deployment and communication  ...  Therefore, the security of sensitive data may be affected when mobile users move it out to the cloud exactly during the processing in virtual machines (VMs).  ...  The authors would like to thank the Ministry of Education Malaysia and Universiti Utara Malaysia for supporting and funding this research.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.19101/ijacr.pid10">doi:10.19101/ijacr.pid10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4lblzjqoobhnbe4swjijcir76y">fatcat:4lblzjqoobhnbe4swjijcir76y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200209061313/https://www.accentsjournals.org/PaperDirectory/Journal/IJACR/2019/7/4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ca/71/ca712a7d60515168e74f723a7587ac27617ca61b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.19101/ijacr.pid10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges

Boubakeur Annane, Osman Ghazali
<span title="2019-04-10">2019</span> <i title="International Association of Online Engineering (IAOE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bnz2cocfqbamzln5r7zndevxnu" style="color: black;">International Journal of Interactive Mobile Technologies</a> </i> &nbsp;
Currently, the eyes of the security expert's community turned towards the virtualization-based security technique either on the Cloud or on the mobile devices.  ...  which provides a robust technology called Mobile Cloud Computing (MCC).  ...  You, "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing," Inf. Sci.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3991/ijim.v13i04.10515">doi:10.3991/ijim.v13i04.10515</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hhf7lpny2feoblfesbxsfpop2i">fatcat:hhf7lpny2feoblfesbxsfpop2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428155136/https://online-journals.org/index.php/i-jim/article/download/10515/5587" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ad/54/ad54885b1570f4fd625b9d9babf8f0d4d8f712d2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3991/ijim.v13i04.10515"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Security Threats in Software Defined Mobile Clouds (SDMC)

R. Mythili, N. Revathi Venkataraman
<span title="2016-06-22">2016</span> <i title="Croatian Communications and Information Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sikghbhjzfcqrlgzmbds5zqseq" style="color: black;">Journal of Communications Software and Systems</a> </i> &nbsp;
Hence SDN leads to a clear roadmap to Software Security control in Mobile Clouds (SDMC). Further it can be extended to a level of Security prevention.  ...  Software Defined Networking (SDN), an emerging wireless network paradigm can make use of rich mobile cloud functionalities such as traffic management, load balancing, routing, and firewall configuration  ...  Mobile Cloud Computing (MCC) in computing evolution makes possible to resolve the challenges by integrating mobile computing with Cloud technologies.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24138/jcomss.v12i2.81">doi:10.24138/jcomss.v12i2.81</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s74xa42ogjdwhg5jwvfw6jxel4">fatcat:s74xa42ogjdwhg5jwvfw6jxel4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922014515/http://jcomss.fesb.unist.hr/index.php/jcomss/article/viewFile/81/59" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1a/98/1a981ba457d6d2f4dcc12dc6b338189ff66c188f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24138/jcomss.v12i2.81"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Overview of 5G Security Challenges and Solutions

Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei Gurtov
<span title="">2018</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/icagtmanlfe2vpw436vxkdhz2i" style="color: black;">IEEE Communications Standards Magazine</a> </i> &nbsp;
Software Defined Networking (SDN) and Network Function Virtualization (NFV) leveraging the advances in cloud computing such as Mobile Edge Computing are the most sought out technologies to meet these requirements  ...  Therefore, this paper provides an overview of the security challenges in clouds, SDN and NFV, and the challenges of user privacy.  ...  protection, in-device spatial cloaking mechanism for privacy protection as well as MobiCloud which is a secure cloud framework for mobile computing and communication.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mcomstd.2018.1700063">doi:10.1109/mcomstd.2018.1700063</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x5ycl4dlkvhqdkgmhfvhic5e7q">fatcat:x5ycl4dlkvhqdkgmhfvhic5e7q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428003723/http://jultika.oulu.fi/files/nbnfi-fe201902124647.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/47/71/4771f1213ddcad23226ed7d42f0e49807f61421d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mcomstd.2018.1700063"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Research gaps based virtualization in mobile cloud computing

Boubakeur Annane, Adel Alti, Osman Ghazali
<span title="2020-11-30">2020</span> <i title="Association of Computer, Communication and Education for National Triumph Social and Welfare Society (ACCENTS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/h6wni7yfjratfglwchnpmbf2iu" style="color: black;">International Journal of Advanced Computer Research</a> </i> &nbsp;
Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud' servers and processed  ...  With the development of cloud computing, mobile devices' resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC).  ...  cloud services. 4.2.6Authentication technique based-secure communication (ATSC) A new authentication technique based-secure communication in the mobile cloud has been proposed by [28] to protect the  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.19101/ijacr.2020.1048101">doi:10.19101/ijacr.2020.1048101</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tyqsmtqf5zdftb5pt4juhatxw4">fatcat:tyqsmtqf5zdftb5pt4juhatxw4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201213085403/https://www.accentsjournals.org/PaperDirectory/Journal/IJACR/2020/11/1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ea/40/ea40b63998040aa6039964a40095b5e241e12d44.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.19101/ijacr.2020.1048101"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation [chapter]

Yexia Cheng, Yuejin Du, Jin Peng, Jun Fu, Baoxu Liu
<span title="">2019</span> <i title="Springer Singapore"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jyopc6cf5ze5vipjlm4aztcffi" style="color: black;">Communications in Computer and Information Science</a> </i> &nbsp;
Security protection framework based on cloud-channel-device cooperation is proposed in this paper to solve the issue.  ...  The trust base is introduced to channel-end to improve trust of secure accessing device. Then, the trust and security module are designed in the cloud-end.  ...  This work is also supported by Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network Security and Protection Technology.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-981-13-6621-5_14">doi:10.1007/978-981-13-6621-5_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xakuiyus2rcovcrgiv4p7y6zpe">fatcat:xakuiyus2rcovcrgiv4p7y6zpe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502133044/https://link.springer.com/content/pdf/10.1007%2F978-981-13-6621-5_14.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ad/94/ad9491c358d95e3e734ead885ba15dd173220ea3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-981-13-6621-5_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review

Belal Ali, Mark A. Gregory, Shuo Li
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge of the network in close proximity to end-users.  ...  Employing "security by design" is substantial to securing components and communication channels within the MEC environment [19], [20].  ...  TABLE 5 . 5 Access Network Communication Channel Security. TABLE 6 . 6 Privacy Protection Methods.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3053233">doi:10.1109/access.2021.3053233</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hhwr3kqfnzhshijnr6uwfep55i">fatcat:hhwr3kqfnzhshijnr6uwfep55i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210428132619/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09330515.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c6/62/c6628d1a3950f7bfe4e0f315ad8a057afd8a9141.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3053233"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Secure Mobile Crowdsensing with Deep Learning [article]

Liang Xiao, Donghua Jiang, Dongjin Xu, Ning An
<span title="2018-01-23">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In order to stimulate secure sensing for Internet of Things (IoT) applications such as healthcare and traffic monitoring, mobile crowdsensing (MCS) systems have to address security threats, such as jamming  ...  In this article, we investigate secure mobile crowdsensing and present how to use deep learning (DL) methods such as stacked autoencoder (SAE), deep neural network (DNN), and convolutional neural network  ...  For example, an MCS server has to estimate the sensing accuracy, computation cost and protection cost in each time slot to decide the payment policy and suppress the faked sensing motivations of mobile  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1801.07379v1">arXiv:1801.07379v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2kr3v2qqhbhbhdfdm5nka55oae">fatcat:2kr3v2qqhbhbhdfdm5nka55oae</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200913223628/https://arxiv.org/pdf/1801.07379v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/20/d5/20d5b1030e9288df4b5d3405046a100e21ce39df.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1801.07379v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Mobile cloud is the infrastructure that facilitates the offloading of storage and computing resources of mobile devices pertaining mobile applications to cloud computing. Mobile devices can run expensive applications using mobile cloud as they can outsour

Riyadh R. Nuiaa
<span title="2018-01-18">2018</span> <i title="Wasit University"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ohsinnqjrzhuzbp6m2x22ndi4m" style="color: black;">Journal of Education College Wasit University</a> </i> &nbsp;
This paper throws light into the security issues and solutions in terms of secure channels transmission in mobile cloud computing.  ...  In this paper, we present state-of-the-art of mobile cloud computing besides its security aspects that are to be taken care of for successful mobile cloud computing.  ...  At communication channel level access point and encryption are involved. The role based access control can have fine-grained control over the secure access of data in mobile cloud computing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31185/eduj.vol1.iss22.234">doi:10.31185/eduj.vol1.iss22.234</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7mibfcdotbd2jlw45hnbby4vwe">fatcat:7mibfcdotbd2jlw45hnbby4vwe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428163142/https://eduj.uowasit.edu.iq/index.php/eduj/article/download/234/196" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/57/36/573634a8899adf45a636661f0996bd2580fb1974.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31185/eduj.vol1.iss22.234"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security in Mobile Edge Caching with Reinforcement Learning [article]

Liang Xiao, Xiaoyue Wan, Canhuang Dai, Xiaojiang Du, Xiang Chen, Mohsen Guizani
<span title="2018-01-18">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We evaluate the performance of the RL-based security solution for mobile edge caching and discuss the challenges that need to be addressed in the future.  ...  Mobile edge computing usually uses cache to support multimedia contents in 5G mobile Internet to reduce the computing overhead and latency.  ...  With limited computation, energy, communication and memory resources, the edge devices are protected by different types of security protocols, which are in general less secure compared with cloud servers  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1801.05915v1">arXiv:1801.05915v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wfccc6v2bnebxiz2uoncjkaknu">fatcat:wfccc6v2bnebxiz2uoncjkaknu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191023084052/https://arxiv.org/pdf/1801.05915v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/44/84/44842bbe42e54812a14056b28e901aedd77af22e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1801.05915v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Security and Privacy Challenges for Internet-of-Things and Fog Computing

Ximeng Liu, Yang Yang, Kim-Kwang Raymond Choo, Huaqun Wang
<span title="2018-09-24">2018</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
., entitled "Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud", presented a verifiable and traceable CP-ABE scheme in eHealth cloud.  ...  Li et al. in their paper, entitled "Reliable Ant Colony Routing Algorithm for Dual-Channel Mobile Ad Hoc Networks," presented reliable path under dual-channel condition (DSAR) system which contained a  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/9373961">doi:10.1155/2018/9373961</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dtklqr7jtze77kap57kckntmmy">fatcat:dtklqr7jtze77kap57kckntmmy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190501093234/http://downloads.hindawi.com/journals/wcmc/2018/9373961.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/90/6f/906f59fdba5bf4502f38fd2befbab5e911395541.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/9373961"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

A Cloud Security Framework Based on Trust Model and Mobile Agent [article]

Saddek Benabied, Abdelhafid Zitouni, Mahieddine Djoudi
<span title="2020-01-22">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision.  ...  Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data.  ...  It is based also, on mobile agent's technology and their features for cloud computing security. The advantage of this architecture is that it uses mobile agents as a communication entity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2001.09090v1">arXiv:2001.09090v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v4dwaezy3jeddf7lha2pirhgye">fatcat:v4dwaezy3jeddf7lha2pirhgye</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321064050/https://arxiv.org/ftp/arxiv/papers/2001/2001.09090.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2001.09090v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b4kxurpz5vbn7gog6wq32vliii" style="color: black;">IEEE Communications Surveys and Tutorials</a> </i> &nbsp;
In addition, security issues in VNFs is presented in [170] . Security considerations for NFV cloud-based mobile virtual network operators are discussed in [183] .  ...  Security Mechanisms for MEC and Cloud Network Systems. selection in real-time multi-criteria decision making problems for Fog and Mobile-Edge Computing (FMEC).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2019.2933899">doi:10.1109/comst.2019.2933899</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bulfng6levdelgmel7oxoi6pna">fatcat:bulfng6levdelgmel7oxoi6pna</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200306101404/https://researchrepository.ucd.ie/bitstream/10197/11170/2/5G_Security_Survey__Revision___Clean___Copy_.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fa/30/fa3018efe342d553718986f2c30422e3149af290.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2019.2933899"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication

Dijiang Huang, Xinwen Zhang, Myong Kang, Jim Luo
<span title="">2010</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rhqc7hsmyvczvgaaxaz2k6wcw4" style="color: black;">2010 Fifth IEEE International Symposium on Service Oriented System Engineering</a> </i> &nbsp;
Keywords-Mobile Ad Hoc Network, Cloud Computing, Context-awareness, Security. ent administrative domains. (2) MANET mobility has a significant impact on the security and communication performance relating  ...  In addition to providing traditional computation services, Mobi-Cloud also enhances the operation of the ad hoc network itself by treating mobile devices as service nodes.  ...  ACKNOWLEDGEMENT The research described in this paper was supported by NSF DUE-0942453.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sose.2010.20">doi:10.1109/sose.2010.20</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sose/HuangZKL10.html">dblp:conf/sose/HuangZKL10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zq7kl5lkmzcrtgoapklzux5vsi">fatcat:zq7kl5lkmzcrtgoapklzux5vsi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809065813/http://profsandhu.com/zhang/pub/mobicloud-sose10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9f/e5/9fe526a75b7488c51b97e9752133fd619bea63be.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sose.2010.20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 17,587 results