Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

A secure authenticated and key exchange scheme for fog computing

CM Chen, Y Huang, KH Wang, S Kumari… - Enterprise Information …, 2021 - Taylor & Francis
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …

[HTML][HTML] Human factor, a critical weak point in the information security of an organization's Internet of things

K Hughes-Lartey, M Li, FE Botchey, Z Qin - Heliyon, 2021 - cell.com
Abstract Internet of Things (IoT) presents opportunities for designing new technologies for
organizations. Many organizations are beginning to accept these technologies for their daily …

An authenticated key exchange protocol for multi-server architecture in 5G networks

TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the
amount of data, so multi-server distributed cloud computing has been widely used in various …

Intelligent resource allocation management for vehicles network: An A3C learning approach

M Chen, T Wang, K Ota, M Dong, M Zhao… - Computer Communications, 2020 - Elsevier
With the increasing demand of users for high-speed, low-delay and high-reliability services
in connected vehicles network, wireless networks with communication, caching and …

Selecting hyper-parameters of Gaussian process regression based on non-inertial particle swarm optimization in Internet of Things

L Kang, RS Chen, N Xiong, YC Chen, YX Hu… - IEEE …, 2019 - ieeexplore.ieee.org
Gaussian process regression (GPR) is frequently used for uncertain measurement and
prediction of nonstationary time series in the Internet of Things data, nevertheless, the …

Heterogeneous signcryption with equality test for IIoT environment

H Xiong, Y Zhao, Y Hou, X Huang, C Jin… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

[HTML][HTML] MLS-ABAC: Efficient multi-level security attribute-based access control scheme

SF Aghili, M Sedaghat, D Singelée, M Gupta - Future Generation Computer …, 2022 - Elsevier
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet
of Things, where various devices with low computational power and different security levels …