4.7 Article

A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

Chenyu Wang et al.

Summary: In this paper, we propose an efficient privacy-preserving user authentication scheme for industry 4.0, which achieves forward secrecy. Compared with other schemes, it meets the latest standards, has reasonable computation cost on sensor nodes, and utilizes the computation and storage capabilities of the cloud center to achieve user anonymity and resistance to offline dictionary attacks.

SCIENCE CHINA-INFORMATION SCIENCES (2022)

Article Computer Science, Hardware & Architecture

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices

Shuming Qiu et al.

Summary: This article proposes a provably secure three-factor AKA protocol based on extended chaotic-maps for mobile lightweight devices. By utilizing Fuzzy-Verifiers and Honeywords techniques, the protocol achieves a good balance between security and usability.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach

Lei Liu et al.

Summary: Mobile-edge computing (MEC) plays a crucial role in supporting various service applications through efficient data sharing. However, the unique characteristics of MEC also introduce data privacy and security concerns, hindering its development. Blockchain technology is seen as a promising solution to ensure secure data sharing, but integrating it into MEC systems faces challenges due to dynamic network conditions. In this article, a secure data sharing scheme using an asynchronous learning approach in a blockchain-enabled MEC system is proposed, aiming to optimize system performance while balancing energy consumption and throughput.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach

Wenti Yang et al.

Summary: This article proposes a secure data access control scheme in smart grid using edge blockchain technology, by outsourcing the computation workloads of end user devices to edge nodes in a consortium blockchain system, adopting an on-chain/off-chain approach for flexible data sharing, and utilizing a threshold secret sharing scheme to establish distributed authority.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Civil

Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain

Qinglei Kong et al.

Summary: Vehicular sensing, combined with fog computing, allows for efficient and secure data collection and sharing at the network edge. Leveraging a permissioned blockchain ensures privacy protection and verifiability in the sharing of sensory data. Performance evaluations demonstrate improvements in efficiency compared to traditional schemes without blockchain integration.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Computer Science, Software Engineering

Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing

Tarunpreet Bhatia et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Information Systems

A dynamic MLP-based DDoS attack detection method using feature selection and feedback

Meng Wang et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

A cloud-edge based data security architecture for sharing and analysing cyber threat information

David W. Chadwick et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing

Leyou Zhang et al.

IEEE SYSTEMS JOURNAL (2020)

Article Automation & Control Systems

A Blockchain-Based Trusted Data Management Scheme in Edge Computing

Ma Zhaofeng et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Flexible attribute-based proxy re-encryption for efficient data sharing

Hua Deng et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

R2PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme

Yuwen Pu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Artificial Intelligence

Preserving Edge Knowledge Sharing Among IoT Services: A Blockchain-Based Approach

Gaolei Li et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2020)

Article Computer Science, Information Systems

A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT

Hua Deng et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Theory & Methods

Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud

Hua Deng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Operations Research & Management Science

Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud

Vitthal Sadashiv Gutte et al.

INTERNATIONAL JOURNAL OF KNOWLEDGE AND SYSTEMS SCIENCE (2020)

Article Computer Science, Information Systems

Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage

Ye Tao et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks

Jiawen Kang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage

Yingjie Xue et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Automation & Control Systems

Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment

Shumin Xue et al.

AUTOMATIC CONTROL AND COMPUTER SCIENCES (2019)

Article Computer Science, Hardware & Architecture

Attribute-based Access Control for ICN Naming Scheme

Bing Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Information Systems

Future Edge Cloud and Edge Computing for Internet of Things Applications

Jianli Pan et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Fog-based File Sharing for Secure and Efficient File Management in Personal Area Network with Heterogeneous Wearable Devices

Jung-Eun Park et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2018)

Article Computer Science, Theory & Methods

Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security

Jianghong Wei et al.

INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE (2017)

Article Computer Science, Information Systems

Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things

Muhammad Baqer Mollah et al.

IEEE CLOUD COMPUTING (2017)

Article Mathematics, Interdisciplinary Applications

Security and efficiency data sharing scheme for cloud storage

Ke Han et al.

CHAOS SOLITONS & FRACTALS (2016)