Querying in internet of things with privacy preserving: Challenges, solutions and opportunities
IoT is envisioned as the next stage of the information revolution, enabling various daily
applications and providing better service by conducting a deep fusion with cloud and fog …
applications and providing better service by conducting a deep fusion with cloud and fog …
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber–physical system
J Xu, L Wei, W Wu, A Wang, Y Zhang, F Zhou - Future Generation …, 2020 - Elsevier
Nowadays the healthcare system is undergoing a paradigm shift to integrate cloud
computing and Internet-of-Things with physical medical equipments into a distributed …
computing and Internet-of-Things with physical medical equipments into a distributed …
SafeQ: Secure and efficient query processing in sensor networks
The architecture of two-tiered sensor networks, where storage nodes serve as an
intermediate tier between sensors and a sink for storing data and processing queries, has …
intermediate tier between sensors and a sink for storing data and processing queries, has …
Privacy-preserving search over encrypted personal health record in multi-source cloud
Cloud-based Personal Health Record systems (CB-PHR) have great potential in facilitating
the management of individual health records. Security and privacy concerns are among the …
the management of individual health records. Security and privacy concerns are among the …
[PDF][PDF] Addressing the future data management challenges in iot: A proposed framework
Internet of Thing (IoT) has been attracting the interest of researchers in recent years.
Traditionally, only handful types of devices had the capability to be connected to …
Traditionally, only handful types of devices had the capability to be connected to …
PPRQ: Privacy-preserving MAX/MIN range queries in IoT networks
S Sciancalepore, R Di Pietro - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Range queries are widely used in several Internet-of-Things (IoT) applications as a general
strategy to improve the efficiency of the system. However, the communication patterns …
strategy to improve the efficiency of the system. However, the communication patterns …
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture
Q Chen, L Wu, C Jiang - Journal of Cloud Computing, 2022 - Springer
Abstract In an Internet of Things (IoT) system based on an anything as a service (XaaS)
architecture, data are uploaded from heterogeneous nodes in a nonstandardized format and …
architecture, data are uploaded from heterogeneous nodes in a nonstandardized format and …
Secure max/min queries in two-tiered wireless sensor networks
H Dai, M Wang, X Yi, G Yang, J Bao - IEEE Access, 2017 - ieeexplore.ieee.org
In wireless sensor networks, secure MAX/MIN query processing is a challenging issue, and
it is useful in fields, where security is necessary. In this paper, we propose a secure …
it is useful in fields, where security is necessary. In this paper, we propose a secure …
Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems
In this paper, we address the problem of integrity protection for data streaming in cloud-
assisted healthcare sensor systems. First, we propose a novel data structure, called the …
assisted healthcare sensor systems. First, we propose a novel data structure, called the …
An integrity-preserving technique for range queries over data streams in two-tier sensor networks
Two-tier sensor networks enable energy and computation saving due to the introduction of
non-constrained storage nodes acting as intermediates between the sensors, which provide …
non-constrained storage nodes acting as intermediates between the sensors, which provide …