4.7 Article

An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems

Related references

Note: Only part of the references are listed.
Article Engineering, Civil

Edge-Centric Secure Service Provisioning in IoT-Enabled Maritime Transportation Systems

Ambigavathi Munusamy et al.

Summary: This paper presents a blockchain-enabled edge-centric framework for real-time data analysis in maritime transportation systems, addressing security and privacy issues. By introducing blockchain and smart contracts, the transactions of each block can be validated, and different classification models can be used to predict malicious vessels.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

Big Data Driven Vessel Trajectory and Navigating State Prediction With Adaptive Learning, Motion Modeling and Particle Filtering Techniques

Zhe Xiao et al.

Summary: Predictive vessel surveillance is a crucial component in intelligent maritime traffic systems, serving as a prerequisite for collision detection and risk assessment. This paper proposes a novel methodology for vessel trajectory and navigating state prediction based on AIS data, utilizing learning, motion modeling, and knowledge base assisted particle filtering processes. The research findings of this work include handling key challenges in vessel trajectory and navigating state prediction, such as adaptive training window determination and effective knowledge storage and searching algorithms.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics

Lei Zhou et al.

Summary: This article proposes an efficient multi-copy dynamic integrity auditing scheme using certificateless signatures, which improves data availability and durability. The scheme improves the classic Merkle Hash Tree and introduces a variable replica number storage strategy, making it more efficient and flexible.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

Jiguo Li et al.

Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Information Systems

Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage

Jaya Rao Gudeme et al.

Summary: This paper presents a Certificateless Multi-Replica Dynamic Public Auditing Scheme for Shared data in cloud storage, addressing integrity and security concerns, supporting shared data dynamics, and enabling secure user revocation. The scheme is proven to be secure against different types of adversaries under certain assumptions and has been shown to be efficient and practical through performance and experimental evaluations.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Identity-Based Dynamic Data Auditing for Big Data Storage

Tao Shang et al.

Summary: Identity-based remote data auditing schemes can verify data integrity and provide simple identity authentication and management for multiple users. However, prior research in this area lacks support for dynamic operations. This paper proposes a new scheme that supports dynamic data operations using Merkle hash tree structure to improve efficiency and integrity assurance.

IEEE TRANSACTIONS ON BIG DATA (2021)

Article Computer Science, Information Systems

On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage

Xiong Li et al.

Summary: This article points out security weaknesses in Shang et al.'s identity-based dynamic data auditing protocol for big data storage, particularly vulnerability to secret key reveal attacks. Suggestions for improving the protocol and preventing similar weaknesses in future designs are also provided.

IEEE TRANSACTIONS ON BIG DATA (2021)

Article Computer Science, Information Systems

Data-Driven Trajectory Quality Improvement for Promoting Intelligent Vessel Traffic Services in 6G-Enabled Maritime IoT Systems

Ryan Wen Liu et al.

Summary: This paper proposes a two-phase data-driven machine learning framework for vessel trajectory reconstruction, aiming to improve the quality of vessel trajectory records by identifying and restoring outliers in AIS data. Experimental results demonstrate the superiority of this framework compared to other methods, showing potential for promoting intelligent vessel traffic services in maritime IoT systems enabled by 6G.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Hybrid Satellite-Terrestrial Communication Networks for the Maritime Internet of Things: Key Technologies, Opportunities, and Challenges

Te Wei et al.

Summary: With the increasing marine activities, there is a growing demand for high-speed and reliable maritime communications. Existing communication technologies may lead to performance loss when used on the ocean, requiring customization for the maritime environment. Future maritime communications are envisioned to be environment-aware, service-driven, and integrated satellite-air-ground networks.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage

Binanda Sengupta et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2020)

Article Engineering, Civil

Traffic Pattern Mining and Forecasting Technologies in Maritime Traffic Service Networks: A Comprehensive Survey

Zhe Xiao et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Engineering, Electrical & Electronic

Intelligent Maritime Networking With Edge Services and Computing Capability

Xin Su et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

GPU-Accelerated Compression and Visualization of Large-Scale Vessel Trajectories in Maritime IoT Industries

Yu Huang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Theory & Methods

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Wenting Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Outsourced dynamic provable data possession with batch update for secure cloud storage

Wei Guo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Data integrity checking with reliable data transfer for secure cloud storage

Yong Wang et al.

INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES (2018)

Article Computer Science, Information Systems

SeaShips: A Large-Scale Precisely Annotated Dataset for Ship Detection

Zhenfeng Shao et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Computer Science, Theory & Methods

Remote data possession checking with privacy-preserving authenticators for cloud storage

Wenting Shen et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation

Yuan Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds

Yujue Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Business

OPERATIONAL SHIPPING INTELLIGENCE THROUGH DISTRIBUTED CLOUD COMPUTING

Dragos Sebastian Cristea et al.

JOURNAL OF BUSINESS ECONOMICS AND MANAGEMENT (2017)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

Jiangtao Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Huaqun Wang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

Security Concerns in Popular Cloud Storage Services

Cheng-Kang Chu et al.

IEEE PERVASIVE COMPUTING (2013)

Article Computer Science, Hardware & Architecture

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing

Jining Zhao et al.

IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2013)