Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things

P Hu, H Ning, T Qiu, H Song, Y Wang… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Face identification and resolution technology is crucial to ensure the identity consistency of
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …

Fog computing based face identification and resolution scheme in internet of things

P Hu, H Ning, T Qiu, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The identification and resolution technology are the prerequisite for realizing identity
consistency of physical-cyber space mapping in the Internet of Things (IoT). Face, as a …

A unified face identification and resolution scheme using cloud computing in Internet of Things

P Hu, H Ning, T Qiu, Y Xu, X Luo… - Future Generation …, 2018 - Elsevier
Abstract In the Internet of Things (IoT), identification and resolution of physical object is
crucial for authenticating object's identity, controlling service access, and establishing trust …

Design of secure key management and user authentication scheme for fog computing services

M Wazid, AK Das, N Kumar, AV Vasilakos - Future Generation Computer …, 2019 - Elsevier
Fog computing (fog networking) is known as a decentralized computing infrastructure in
which data, applications, compute as well as data storage are scattered in the most logical …

Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

S Amanlou, MK Hasan, KAA Bakar - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …

A secure authenticated and key exchange scheme for fog computing

CM Chen, Y Huang, KH Wang, S Kumari… - Enterprise Information …, 2021 - Taylor & Francis
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …

Fog-centric authenticated key agreement scheme without trusted parties

Y Guo, Z Zhang, Y Guo - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Fog computing can effectively provide a variety of application support for the fast-growing
number of Internet of Things devices. However, the unique characteristics of fog computing …

Improved authenticated key agreement scheme for fog‐driven IoT healthcare system

TY Wu, T Wang, YQ Lee, W Zheng… - Security and …, 2021 - Wiley Online Library
The Internet of things (IoT) has been widely used for various applications including medical
and transportation systems, among others. Smart medical systems have become the most …

Data security and privacy in fog computing

Y Guan, J Shao, G Wei, M Xie - IEEE Network, 2018 - ieeexplore.ieee.org
Cloud computing is now a popular computing paradigm that can provide end users access
to configurable resources on any device, from anywhere, at any time. During the past years …

An identity-based encryption scheme for data security in fog computing

N Farjana, S Roy, MJN Mahi… - … of International Joint …, 2020 - Springer
Fog computing provides better integration facilities between cloud computing and Internet of
things with real-time interactions. It delivers faster computing functionalities sitting close to …