Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

B Bera, D Chattaraj, AK Das - Computer Communications, 2020 - Elsevier
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …

Blockchain based energy trading scheme for vehicle-to-vehicle using decentralized identifiers

M Kim, J Lee, J Oh, K Park, Y Park, K Park - Applied Energy, 2022 - Elsevier
A blockchain-based energy trading system is a new paradigm of grid infrastructure, which
allows that energy purchaser and seller can efficiently exchange the energy through two …

[HTML][HTML] A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

U Narayanan, V Paul, S Joseph - … of King Saud University-Computer and …, 2022 - Elsevier
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different
issues have ascended in the area of Big data security such as infrastructure security, data …

Design of secure decentralized car-sharing system using blockchain

M Kim, J Lee, K Park, Y Park, KH Park, Y Park - IEEE Access, 2021 - ieeexplore.ieee.org
Car-sharing systems can solve various urban problems by providing shared vehicles to
people and reducing the operation of personal vehicles. With the development of the …

Designing fine-grained access control for software-defined networks using private blockchain

D Chattaraj, B Bera, AK Das… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Emerging next-generation Internet yields proper administration of a wide-ranging dynamic
network to assist rapid ubiquitous resource accessibility, whilst providing higher channel …

IFHDS: intelligent framework for securing healthcare bigdata

YM Essa, EED Hemdan, A El-Mahalawy… - Journal of medical …, 2019 - Springer
Big data has become one of the most imperative technologies for collecting, handling and
analysing enormous volumes of data in a high-performance environment. Enterprise …

Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme

M Nikooghadam, H Amintoosi - International Journal of …, 2023 - Wiley Online Library
Summary Internet of Things (IoT) is a newly emerged paradigm where multiple embedded
devices, known as things, are connected via the Internet to collect, share, and analyze data …

A secure batch authentication scheme for multiaccess edge computing in 5G-enabled intelligent transportation system

M Kim, J Lee, J Oh, D Kwon, K Park, Y Park… - IEEE …, 2022 - ieeexplore.ieee.org
With the introduction of 5G technology in the intelligent transportation system (ITS), data
bandwidth over communication channel is significantly increased. In the existing cloud …

[HTML][HTML] Token-based authentication for Hadoop platform

M Haggag, MM Tantawy, MMS El-Soudani - Ain Shams Engineering …, 2023 - Elsevier
The Hadoop platform has been adopted to process Big Data. The existing authentication
protocol for Hadoop is Kerberos. Kerberos protocol has a vulnerability against weak …

A novel framework using apache spark for privacy preservation of healthcare big data

V Suneetha, S Suresh… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
The privacy of sensitive data in healthcare big data should be protected so that it does not
intrude the privacy of specific patient or transactions of health care organizations. Privacy …