4.7 Article

A Survey on Privacy Preservation in Fog-Enabled Internet of Things

Related references

Note: Only part of the references are listed.
Article Computer Science, Cybernetics

Privacy-Aware Collaborative Task Offloading in Fog Computing

Mian Muaz Razaq et al.

Summary: This article discusses the increase in demand for mobile data requests with the mature of 5G, and how fog computing can help to offload real-time tasks and address user privacy concerns caused by insecure fog nodes. By dividing IoT user tasks into segments and offloading them to multiple fog nodes, security can be enhanced to prevent sensitive data leakage.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)

Article Computer Science, Information Systems

Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing

Zhuoran Ma et al.

Summary: With the development of machine learning, mobile users can now submit individual symptoms for medical diagnosis anytime and anywhere. However, data-driven machine learning often compromises the privacy of medical data, necessitating the need for privacy preservation. In this article, the authors propose a lightweight privacy-preserving medical diagnosis mechanism called LPME to address these challenges.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling

Hamza Baniata et al.

Summary: Cloud Computing (CC) deployment has become popular across various fields, and task scheduling in complex scenarios like smart cities is challenging, where Blockchain and Ant Colony Optimization can improve efficiency. Fog Computing further enhances task execution, while ensuring privacy of system components.

INFORMATION PROCESSING & MANAGEMENT (2021)

Article Computer Science, Information Systems

Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems

B. D. Deebak et al.

Summary: Session Initiation Protocol (SIP) is a communication protocol for multimedia systems, supporting real-time communication; the rapid growth of wireless communication has fostered the development of value-added services; continuous emergence of new applications in healthcare and other domains integrating multimedia resources for real-time analysis.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Article Computer Science, Theory & Methods

Lightweight, Divide-and-Conquer privacy-preserving data aggregation in fog computing

Kinza Sarwar et al.

Summary: This paper presents a lightweight Divide-and-Conquer privacy-preserving data aggregation scheme in fog computing that improves data privacy, processing, and storage capabilities. By effectively dividing data based on the Level of Privacy (LoP) and reducing computational and memory overhead, the scheme enhances performance efficiency in achieving data privacy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Theory & Methods

Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids

Shuai Zhao et al.

Summary: The article presents a smart and practical Privacy-preserving Data Aggregation (PDA) scheme with smart pricing and packing method for fog-based smart grids, achieving diversified tariffs, multifunctional statistics and efficiency. The proposed scheme includes a smart PDA scheme with Smart Pricing (PDA-SP) and a practical PDA scheme with Packing Method (PDA-PM), which reduces encrypted data size and improves secure computations. The scheme is secure against many threats and effectively reduces computation and communication overheads through Somewhat Homomorphic Encryption (SHE) and an optimized packing method.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

A survey on data aggregation techniques in IoT sensor networks

Soroush Abbasian Dehkordi et al.

WIRELESS NETWORKS (2020)

Review Computer Science, Information Systems

An exhaustive survey on security and privacy issues in Healthcare 4.0

Jigna J. Hathaliya et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City

Mehdi Gheisari et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Computer Science, Theory & Methods

An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy

Sachi Nandan Mohanty et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Designing privacy-aware internet of things applications

Charith Perera et al.

INFORMATION SCIENCES (2020)

Article Transportation

Identifying spatio-temporal patterns of bus bunching in urban networks

Christina A. Iliopoulou et al.

JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Engineering, Electrical & Electronic

Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid

Jia-Nan Liu et al.

IEEE TRANSACTIONS ON SMART GRID (2020)

Article Computer Science, Theory & Methods

A two-way trust management system for fog computing

Esubalew Alemneh et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

A privacy-preserving data aggregation scheme for dynamic groups in fog computing

Xiaodong Shen et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Hardware & Architecture

Temporal Differential Privacy in Wireless Sensor Networks

Bodhi Chakraborty et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Telecommunications

SDN based communications privacy-preserving architecture for VANETs using fog computing

Muhammad Arif et al.

VEHICULAR COMMUNICATIONS (2020)

Article Computer Science, Theory & Methods

Classification of optimization problems in fog computing

Julian Bellendorf et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Engineering, Electrical & Electronic

Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme

Jie Cui et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing

Youyang Qu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

A robust authentication and access control protocol for securing wireless healthcare sensor networks

Zeeshan Ali et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

Efficient location privacy-preserving range query scheme for vehicle sensing systems

Peng Hu et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2020)

Article Telecommunications

A privacy-preserving mechanism based on local differential privacy in edge computing

Mengnan Bi et al.

China Communications (2020)

Article Computer Science, Hardware & Architecture

Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT

Siguang Chen et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2020)

Proceedings Paper Computer Science, Information Systems

A Privacy Preserving Model for Fog-enabled MCC systems using 5G Connection

Hamza Baniata. et al.

2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC) (2020)

Article Computer Science, Information Systems

Privacy-Preserving Federated Learning in Fog Computing

Chunyi Zhou et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies

Salma Abdalla Hamad et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Cybernetics

P-3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing

Ping Zhao et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2020)

Article Computer Science, Information Systems

Revamping data access privacy preservation method against inside attacks in wireless sensor networks

S. Sathees Babu et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Software Engineering

Video denoising for security and privacy in fog computing

Hong Zhang et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)

Article Chemistry, Analytical

Ontology-Defined Middleware for Internet of Things Architectures

Victor Caballero et al.

SENSORS (2019)

Editorial Material Computer Science, Hardware & Architecture

Fog Computing Security Challenges and Future Directions

Deepak Puthal et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2019)

Article Computer Science, Information Systems

A novel privacy- and integrity-preserving approach for multidimensional data range queries in two-tiered wireless sensor networks

Lei Wang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)

Article Computer Science, Theory & Methods

Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

Z. Berkay Celik et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Hardware & Architecture

APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT

Zhitao Guan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Dynamic and Disjoint Routing Mechanism for Protecting Source Location Privacy in WSNs

Mengmeng Xu et al.

2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019) (2019)

Proceedings Paper Computer Science, Information Systems

Privacy-Preserving and Dynamic Spatial Range Aggregation Query Processing in Wireless Sensor Networks

Lisong Wang et al.

DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (2019)

Article Computer Science, Information Systems

Privacy Ensured e-Healthcare for Fog-Enhanced IoT Based Applications

Rahul Saha et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Data provenance to audit compliance with privacy policy in the Internet of Things

Thomas Pasquier et al.

PERSONAL AND UBIQUITOUS COMPUTING (2018)

Article Telecommunications

Security in Internet of Things: issues, challenges, taxonomy, and architecture

Vipindev Adat et al.

TELECOMMUNICATION SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT

Sana Belguith et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Hardware & Architecture

Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks

Edwin Prem Kumar Gilbert et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Information Systems

MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem

Georgios Karopoulos et al.

COMPUTERS & SECURITY (2018)

Article Engineering, Electrical & Electronic

A resilient data aggregation method based on spatio-temporal correlation for wireless sensor networks

Yong Lu et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)

Article Computer Science, Theory & Methods

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

Prosanta Gope et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Security and trust issues in Fog computing: A survey

PeiYun Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A robust and anonymous patient monitoring system using wireless medical sensor networks

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework

Vasileios A. Memos et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

Dongyoung Koo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Secure intelligent traffic light control using fog computing

Jian Liu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Anonymous and secure aggregation scheme in fog-based public cloud computing

Huaqun Wang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Hybrid privacy-preserving clinical decision support system in fog-cloud computing

Ximeng Liu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems

Samet Tonyali et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Position based cryptography with location privacy: A step for Fog Computing

Rupeng Yang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

Khalid Mahmood et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes

Ming Tao et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Secure integration of IoT and Cloud Computing

Christos Stergiou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Privacy in the Smart City-Applications, Technologies, Challenges, and Solutions

David Eckhoff et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Hybrid online protocols for source location privacy in wireless sensor networks

Matthew Bradbury et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2018)

Article Computer Science, Information Systems

A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT

Pradip Kumar Sharma et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Cloud-Based Fine-Grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation

Lo-Yao Yeh et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Editorial Material Computer Science, Information Systems

Security and Privacy Challenges for Internet-of-Things and Fog Computing

Ximeng Liu et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Multidisciplinary Sciences

Tracking job and housing dynamics with smartcard data

Jie Huang et al.

PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2018)

Article Computer Science, Information Systems

Enforcing authorizations while protecting access confidentiality

Sabrina De Capitani di Vimercati et al.

JOURNAL OF COMPUTER SECURITY (2018)

Article Computer Science, Information Systems

A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance

Haiyong Bao et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Theory & Methods

Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation

Prem Prakash Jayaraman et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Theory & Methods

Evolving privacy: From sensors to the Internet of Things

Javier Lopez et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Theory & Methods

Towards a secure service provisioning framework in a Smart city environment

Zaheer Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Engineering, Electrical & Electronic

Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions

Jun Zhou et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Engineering, Electrical & Electronic

Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks

Prosanta Gope et al.

IEEE SENSORS JOURNAL (2017)

Article Computer Science, Theory & Methods

Anonymous Secure Framework in Connected Smart Home Environments

Pardeep Kumar et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids

Hua Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning

Tao Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status

Yuan Hong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Civil

Distributed Aggregate Privacy-Preserving Authentication in VANETs

Lei Zhang et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

Preservation of temporal privacy in body sensor networks

Abolfazl Diyanat et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Theory & Methods

A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications

Wei Song et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2017)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT

Rongxing Lu et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Security and Privacy in Fog Computing: Challenges

Mithun Mukherjee et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing

Yan Huo et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing

Sultan Basudan et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

Pengfei Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

IoT Applications on Secure Smart Shopping System

Ruinian Li et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Review Computer Science, Information Systems

A Survey on Security and Privacy Issues in Internet-of-Things

Yuchen Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes

Tianyi Song et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos

Eman T. Hassan et al.

2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2017)

Article Computer Science, Information Systems

Towards product customization and personalization in IoT-enabled cloud manufacturing

Chen Yang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Full autonomy: A novel individualized anonymity model for privacy preserving

Junqing Le et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Privacy-preserving data aggregation scheme against internal attackers in smart grids

Debiao He et al.

WIRELESS NETWORKS (2016)

Article Computer Science, Information Systems

Efficient smart metering based on homomorphic encryption

N. Busom et al.

COMPUTER COMMUNICATIONS (2016)

Article Computer Science, Interdisciplinary Applications

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems

Anil Kumar Sutrala et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)

Article Computer Science, Hardware & Architecture

Fully secure fuzzy identity-based encryption for secure IoT communications

Yijun Mao et al.

COMPUTER STANDARDS & INTERFACES (2016)

Article Computer Science, Theory & Methods

A comprehensive approach to privacy in the cloud-based Internet of Things

Martin Henze et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Engineering, Electrical & Electronic

Privacy-Aware Multipath Video Caching for Content-Centric Networks

Qinghua Wu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

ON THE FEASIBILITY OF ATTRIBUTE-BASED ENCRYPTION ON INTERNET OF THINGS DEVICES

Moreno Ambrosin et al.

IEEE MICRO (2016)

Article Computer Science, Hardware & Architecture

Fog-Computing-Based Radio Access Networks: Issues and Challenges

Mugen Peng et al.

IEEE NETWORK (2016)

Article Automation & Control Systems

A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

Prosanta Gope et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)

Article Computer Science, Theory & Methods

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Zhihua Xia et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article

Forensic-by-Design Framework for Cyber-Physical Cloud Systems

Nurul Hidayah Ab Rahman et al.

IEEE Cloud Computing (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Enhancing Lifelogging Privacy by Detecting Screens

Mohammed Korayem et al.

34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016 (2016)

Article Computer Science, Hardware & Architecture

A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems

Xinyu Yang et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Information Systems

SecKit: A Model-based Security Toolkit for the Internet of Things

Ricardo Neisse et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Artificial Intelligence

CloudID: Trustworthy cloud-based and cross-enterprise biometric identification

Mohammad Haghighat et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Information Systems

Trustworthy Processing of Healthcare Big Data in Hybrid Clouds

Surya Nepal et al.

IEEE CLOUD COMPUTING (2015)

Article Telecommunications

Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption

Soufiene Ben Othman et al.

WIRELESS PERSONAL COMMUNICATIONS (2015)

Article Computer Science, Information Systems

PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications

Le Chen et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Privacy in Internet of Things: A Model and Protection Framework

Afshan Samani et al.

6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015) (2015)

Article Geography

Social Sensing: A New Approach to Understanding Our Socioeconomic Environments

Yu Liu et al.

ANNALS OF THE ASSOCIATION OF AMERICAN GEOGRAPHERS (2015)

Article Computer Science, Information Systems

Location leakage in distance bounding: Why location privacy does not work

Aikaterini Mitrokotsa et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Theory & Methods

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things

Jinshu Su et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Hardware & Architecture

HETEROGENEOUS CLOUD RADIO ACCESS NETWORKS: A NEW PERSPECTIVE FOR ENHANCING SPECTRAL AND ENERGY EFFICIENCIES

Mugen Peng et al.

IEEE WIRELESS COMMUNICATIONS (2014)

Proceedings Paper Computer Science, Cybernetics

In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-Mediating Technologies

Tamara Denning et al.

32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014) (2014)

Article Computer Science, Information Systems

Anonymous authentication for privacy-preserving IoT target-driven applications

Almudena Alcaide et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Theory & Methods

Fully Private Noninteractive Face Verification

Juan Ramon Troncoso-Pastoriza et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Engineering, Electrical & Electronic

Adaptive Traffic Signal Control With Vehicular Ad hoc Networks

Kartik Pandit et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2013)

Article Engineering, Electrical & Electronic

Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks

Xiaodong Lin et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2013)

Review Computer Science, Interdisciplinary Applications

Security and privacy in electronic health records: A systematic literature review

Jose Luis Fernandez-Aleman et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2013)

Article Computer Science, Information Systems

Protecting the sink location privacy in wireless sensor networks

Lin Yao et al.

PERSONAL AND UBIQUITOUS COMPUTING (2013)

Article Multidisciplinary Sciences

Understanding metropolitan patterns of daily encounters

Lijun Sun et al.

PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2013)

Editorial Material Engineering, Electrical & Electronic

Combining Cloud and sensors in a smart city environment

Nathalie Mitton et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2012)

Article Computer Science, Information Systems

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

Kiran Mehta et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)

Article Computer Science, Theory & Methods

RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks

Chien-Ming Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Hardware & Architecture

On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy

Arshad Jhumka et al.

COMPUTER JOURNAL (2011)

Article Computer Science, Information Systems

Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Claude Castelluccia et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2009)