BSIF: Blockchain-based secure, interactive, and fair mobile crowdsensing
Given the explosive growth of portable devices, mobile crowdsensing (MCS) is becoming an
essential approach that fully utilizes pervasive idle resources to accomplish sensing tasks …
essential approach that fully utilizes pervasive idle resources to accomplish sensing tasks …
P2AE: Preserving Privacy, Accuracy, and Efficiency in Location-Dependent Mobile Crowdsensing
With the widespread prevalence of smart devices, mobile crowdsensing (MCS) becomes a
new trend to encourage mobile nodes to participate in cooperative data collection in various …
new trend to encourage mobile nodes to participate in cooperative data collection in various …
P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing
Cloud computing has changed the way enterprises store, access and share data. Big data
sets are constantly being uploaded to the cloud and shared within a hierarchy of many …
sets are constantly being uploaded to the cloud and shared within a hierarchy of many …
A trustworthy agent-based encrypted access control method for mobile cloud computing environment
N Agrawal, S Tapaswi - Pervasive and Mobile Computing, 2019 - Elsevier
To strengthen the security of access control protocols for mobile cloud environment, dynamic
attributes of mobile devices are used. The weak or disconnection issue of the mobile …
attributes of mobile devices are used. The weak or disconnection issue of the mobile …
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
In mobile cloud computing (MCC), data are stored and processed by more powerful
computing platforms located in clouds to enhance the capability of mobile devices. Although …
computing platforms located in clouds to enhance the capability of mobile devices. Although …
Privacy preserving spatio-temporal attribute-based encryption for cloud applications
Cloud computing offers scalable implementation of applications by sharing internet-based
storage and computing resources. However, its ubiquitous nature introduces the security …
storage and computing resources. However, its ubiquitous nature introduces the security …
A scalable and efficient multi-agent architecture for malware protection in data sharing over mobile cloud
Sensitive Data requires encryption before uploading to a public cloud. Access control based
on Attribute-Based Encryption (ABE) is an effective technique to ensure data shared security …
on Attribute-Based Encryption (ABE) is an effective technique to ensure data shared security …
[PDF][PDF] Applied Attribute-based Encryption Schemes.
S Zickau, D Thatmann, A Butyrtschik, I Denisow… - ICIN, 2016 - opendl.ifip-tc6.org
The advent of new cryptographic methods in recent years also includes schemes related to
functional encryption. Within these schemes Attribute-based Encryption (ABE) became the …
functional encryption. Within these schemes Attribute-based Encryption (ABE) became the …
Deep Neural Networks for Dynamic Attribute based Encryption in IoT-Fog Environment
M Talreja, MP Taranath, H Shanware… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
In a healthcare IoT based Fog System, malicious attacks may alter patient's critical health
data, which may lead to severe repercussions. This makes it incumbent to adopt …
data, which may lead to severe repercussions. This makes it incumbent to adopt …
A new LTMA-ABE location and time access security control scheme for mobile cloud
For mobile applications, mobile cloud computing (MCC) presents a revolutionary paradigm
that allows mobile users to compute and store data on resource-rich cloud servers …
that allows mobile users to compute and store data on resource-rich cloud servers …