Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …
the academy and industry because it has several potential applications ranging from the …
Blockchain based energy trading scheme for vehicle-to-vehicle using decentralized identifiers
A blockchain-based energy trading system is a new paradigm of grid infrastructure, which
allows that energy purchaser and seller can efficiently exchange the energy through two …
allows that energy purchaser and seller can efficiently exchange the energy through two …
[HTML][HTML] A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment
U Narayanan, V Paul, S Joseph - … of King Saud University-Computer and …, 2022 - Elsevier
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different
issues have ascended in the area of Big data security such as infrastructure security, data …
issues have ascended in the area of Big data security such as infrastructure security, data …
Design of secure decentralized car-sharing system using blockchain
Car-sharing systems can solve various urban problems by providing shared vehicles to
people and reducing the operation of personal vehicles. With the development of the …
people and reducing the operation of personal vehicles. With the development of the …
Designing fine-grained access control for software-defined networks using private blockchain
Emerging next-generation Internet yields proper administration of a wide-ranging dynamic
network to assist rapid ubiquitous resource accessibility, whilst providing higher channel …
network to assist rapid ubiquitous resource accessibility, whilst providing higher channel …
IFHDS: intelligent framework for securing healthcare bigdata
Big data has become one of the most imperative technologies for collecting, handling and
analysing enormous volumes of data in a high-performance environment. Enterprise …
analysing enormous volumes of data in a high-performance environment. Enterprise …
Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme
M Nikooghadam, H Amintoosi - International Journal of …, 2023 - Wiley Online Library
Summary Internet of Things (IoT) is a newly emerged paradigm where multiple embedded
devices, known as things, are connected via the Internet to collect, share, and analyze data …
devices, known as things, are connected via the Internet to collect, share, and analyze data …
A secure batch authentication scheme for multiaccess edge computing in 5G-enabled intelligent transportation system
With the introduction of 5G technology in the intelligent transportation system (ITS), data
bandwidth over communication channel is significantly increased. In the existing cloud …
bandwidth over communication channel is significantly increased. In the existing cloud …
[HTML][HTML] Token-based authentication for Hadoop platform
The Hadoop platform has been adopted to process Big Data. The existing authentication
protocol for Hadoop is Kerberos. Kerberos protocol has a vulnerability against weak …
protocol for Hadoop is Kerberos. Kerberos protocol has a vulnerability against weak …
A novel framework using apache spark for privacy preservation of healthcare big data
V Suneetha, S Suresh… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
The privacy of sensitive data in healthcare big data should be protected so that it does not
intrude the privacy of specific patient or transactions of health care organizations. Privacy …
intrude the privacy of specific patient or transactions of health care organizations. Privacy …