BSIF: Blockchain-based secure, interactive, and fair mobile crowdsensing

W Wang, Y Yang, Z Yin, K Dev, X Zhou… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Given the explosive growth of portable devices, mobile crowdsensing (MCS) is becoming an
essential approach that fully utilizes pervasive idle resources to accomplish sensing tasks …

P2AE: Preserving Privacy, Accuracy, and Efficiency in Location-Dependent Mobile Crowdsensing

Y Jiang, K Zhang, Y Qian, L Zhou - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the widespread prevalence of smart devices, mobile crowdsensing (MCS) becomes a
new trend to encourage mobile nodes to participate in cooperative data collection in various …

P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing

E Zaghloul, K Zhou, J Ren - IEEE Transactions on Big Data, 2019 - ieeexplore.ieee.org
Cloud computing has changed the way enterprises store, access and share data. Big data
sets are constantly being uploaded to the cloud and shared within a hierarchy of many …

A trustworthy agent-based encrypted access control method for mobile cloud computing environment

N Agrawal, S Tapaswi - Pervasive and Mobile Computing, 2019 - Elsevier
To strengthen the security of access control protocols for mobile cloud environment, dynamic
attributes of mobile devices are used. The weak or disconnection issue of the mobile …

Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling

F Jamal, MT Abdullah, ZM Hanapi, A Abdullah - IEEE Access, 2019 - ieeexplore.ieee.org
In mobile cloud computing (MCC), data are stored and processed by more powerful
computing platforms located in clouds to enhance the capability of mobile devices. Although …

Privacy preserving spatio-temporal attribute-based encryption for cloud applications

K Routray, P Bera - Cluster Computing, 2025 - Springer
Cloud computing offers scalable implementation of applications by sharing internet-based
storage and computing resources. However, its ubiquitous nature introduces the security …

A scalable and efficient multi-agent architecture for malware protection in data sharing over mobile cloud

ZH Qaisar, SH Almotiri, MA Al Ghamdi, AA Nagra… - IEEE …, 2021 - ieeexplore.ieee.org
Sensitive Data requires encryption before uploading to a public cloud. Access control based
on Attribute-Based Encryption (ABE) is an effective technique to ensure data shared security …

[PDF][PDF] Applied Attribute-based Encryption Schemes.

S Zickau, D Thatmann, A Butyrtschik, I Denisow… - ICIN, 2016 - opendl.ifip-tc6.org
The advent of new cryptographic methods in recent years also includes schemes related to
functional encryption. Within these schemes Attribute-based Encryption (ABE) became the …

Deep Neural Networks for Dynamic Attribute based Encryption in IoT-Fog Environment

M Talreja, MP Taranath, H Shanware… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
In a healthcare IoT based Fog System, malicious attacks may alter patient's critical health
data, which may lead to severe repercussions. This makes it incumbent to adopt …

A new LTMA-ABE location and time access security control scheme for mobile cloud

I Merdassi, C Ghazel, L Saidane - The Journal of Supercomputing, 2023 - Springer
For mobile applications, mobile cloud computing (MCC) presents a revolutionary paradigm
that allows mobile users to compute and store data on resource-rich cloud servers …