[HTML][HTML] Care4U: Integrated healthcare systems based on blockchain

R Kamal, EED Hemdan, N El-Fishway - Blockchain: Research and …, 2023 - Elsevier
During the COVID-19 crisis, the need to stay at home has increased dramatically. In
addition, the number of sick people, especially elderly persons, has increased exponentially …

LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems

H Ali, I Ahmed - Computers & Security, 2024 - Elsevier
Fog computing is a new computing model with limited resources located near the Internet of
Things (IoT) devices to provide low transmission delay, mobility, and location awareness …

TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments

NC Gowda, SS Manvi, AB Malakreddy… - The Journal of …, 2024 - Springer
A mechanism of fog computing environment is employed in order to enhance the cloud
computing services toward the edge devices in a range of locations with low latency. A fog …

Efficient ECC-based authentication scheme for fog-based IoT environment

MA Shaaban, AS Alsharkawy, MT AbouKreisha… - arXiv preprint arXiv …, 2024 - arxiv.org
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several
threats, such as latency, security, network failure, and performance. These issues are solved …

[HTML][HTML] Fog computing effective load balancing and strategy for deadlock prediction management

M Talaat, A Saleh, M Moawad, J Zaki - Ain Shams Engineering Journal, 2023 - Elsevier
The reliability, real-time performance, and quality of service of fog computing are
dramatically affected by deadlock. In this paper, a new Deadlock Management System for a …

A sustainable mutual authentication protocol for IoT-Fog-Cloud environment

SP Satpathy, S Mohanty, M Pradhan - Peer-to-Peer Networking and …, 2025 - Springer
This paper introduces a mutual authentication protocol designed for the IoT-Fog-Cloud
environment, utilizing Elliptic Curve Cryptography (ECC). The proposed protocol supports …

Design of an efficient and secure authentication scheme for cloud-fog-device framework using key agreement and management

M Hegde, RR Rao, R Bhat - IEEE Access, 2024 - ieeexplore.ieee.org
IoT and Smart devices are typically deployed for real-time applications that need to
communicate to the cloud infrastructure for data processing and storage. However, the cloud …

AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

FM Salem, M Safwat, R Fathy, S Habashy - Journal of Cloud Computing, 2023 - Springer
The rapid growth of Internet users was the motivation of the emerge appearance of new
computing models such as cloud computing, fog computing and edge computing. For this …

A comprehensive survey on cloud security mechanisms

D Hakani, PS Mann - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Cloud computing indicates a tremendous promise for providing on-demand solutions to
customers with increased flexibility even at a lower cost over the internet. Cloud service …

Secure Mutual Authentication Scheme in Fog Computing: Survey

SR Homadi, OA Dawood - 2023 Al-Sadiq International …, 2023 - ieeexplore.ieee.org
As fog computing becomes more widespread, security issues become increasingly critical.
Mutual authentication between fog nodes and end-users is a crucial part of fog computing …