Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles

H Chai, S Leng, K Zhang, S Mao - IEEE Access, 2019 - ieeexplore.ieee.org
Resource sharing among vehicles can highly improve the capability and efficiency of
Internet of Vehicles (IoV). However, it is challenging to establish trust and preserve privacy …

[PDF][PDF] A review on data protection of cloud computing security, benefits, risks and suggestions

G Kumar - United International Journal for Research & …, 2019 - uijrt.com
While cloud computing is picking up notoriety, various security and protection issues are
developing that ruin the fast reception of this new computing worldview. What's more, the …

[HTML][HTML] An overview on user profiling in online social networks

GU Vasanthakumar, K Sunithamma, PD Shenoy… - International Journal of …, 2017 - ijais.org
Abstract Advances in Online Social Networks is creating huge data day in and out providing
lot of opportunities to its users to express their interest and opinion. Due to the popularity …

An approach for incremental mining of clickstream patterns as a service application

HM Huynh, B Vo, ZK Oplatková… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Sequential pattern mining in general and one particular form, clickstream pattern mining, are
data mining topics that have recently attracted attention due to their potential applications of …

Incremental clickstream pattern mining with search boundaries

HM Huynh, NN Pham, ZK Oplatkova, LTT Nguyen… - Information …, 2024 - Elsevier
Recently, there has been a growing interest in sequential pattern mining in data mining, with
a particular focus on clickstream pattern mining. These areas hold the potential for …

Integrity authentication for SQL query evaluation on outsourced databases: A survey

B Zhang, B Dong, WH Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Spurred by the development of cloud computing, there has been considerable recent
interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or …

Prelarge-based utility-oriented data analytics for transaction modifications in internet of things

U Yun, H Kim, T Ryu, Y Baek, H Nam… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) environment includes things that exchange information using
data generated through sensors. The IoT technology can be executed efficiently by …

Sentinels and twins: effective integrity assessment for distributed computation

SDC di Vimercati, S Foresti, S Jajodia… - … on Parallel and …, 2022 - ieeexplore.ieee.org
Distributed computing supports large scale and data-intensive computations with the
cooperation of a multitude of parties, each responsible for a portion of the workload. Such …

Efficient integrity verification of secure outsourced knn computation in cloud environments

H Rong, H Wang, J Liu, W Wu… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
With the ever increasing demand on computational and storage resources to deal with
tremendous growth of big data, clients tend to outsource their data mining tasks to cloud …

Generalized proxy oblivious signature and its mobile application

SY Chiou, YX He - Security and Communication Networks, 2021 - Wiley Online Library
Oblivious signature ensures users select from the specified candidates. However, users can
choose only one candidate. This paper proposes a generalized oblivious signature scheme …