Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing
暂无分享,去创建一个
Zahid Mahmood | Ata Ullah | Waqas Ahmad | Shengling Wang | . Sheharyar | Zahid Mahmood | A. Ullah | Shengling Wang | Waqas Ahmad | .. Sheharyar
[1] Xi Fang,et al. Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.
[2] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[3] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[4] Levent Ertaul,et al. Security Challenges in Cloud Computing , 2010, Security and Management.
[5] Ming Xu,et al. FIDC: A framework for improving data credibility in mobile crowdsensing , 2017, Comput. Networks.
[6] Jiguo Yu,et al. Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems , 2017, IEEE Internet of Things Journal.
[7] Zhongcheng Li,et al. A Truthful Incentive Mechanism for Online Recruitment in Mobile Crowd Sensing System , 2017, Sensors.
[8] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[9] Burak Kantarci,et al. Anchor-Assisted and Vote-Based Trustworthiness Assurance in Smart City Crowdsensing , 2016, IEEE Access.
[10] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[11] Mohammed Hussain,et al. Trust in Mobile Cloud Computing with LTE-based Deployment , 2014, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops.
[12] Ioannis N. Athanasiadis,et al. Privacy-preserving computation of participatory noise maps in the cloud , 2014, J. Syst. Softw..
[13] Fan Wu,et al. Data Quality Guided Incentive Mechanism Design for Crowdsensing , 2018, IEEE Transactions on Mobile Computing.
[14] Xiaohui Liang,et al. Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.
[15] Siti Hafizah Ab Hamid,et al. Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues , 2015, Simul. Model. Pract. Theory.
[16] Jian Shen,et al. Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length , 2017, Secur. Commun. Networks.
[17] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[18] Hao Wang,et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.
[19] Nima Jafari Navimipour,et al. Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms , 2018, Journal of Electrical Systems and Information Technology.
[20] Georgios Kambourakis,et al. A cloud-based architecture to crowdsource mobile app privacy leaks , 2014, Panhellenic Conference on Informatics.
[21] V. Viji Rajendran,et al. Hybrid model for dynamic evaluation of trust in cloud services , 2016, Wirel. Networks.
[22] Jian Shen,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..
[23] Luca Foschini,et al. Quantifying User Reputation Scores, Data Trustworthiness, and User Incentives in Mobile Crowd-Sensing , 2017, IEEE Access.
[24] Jin Li,et al. Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..
[25] Yunhao Liu,et al. Toward Efficient Mechanisms for Mobile Crowdsensing , 2017, IEEE Transactions on Vehicular Technology.
[26] Victor C. M. Leung,et al. A Novel Sensory Data Processing Framework to Integrate Sensor Networks With Mobile Cloud , 2016, IEEE Systems Journal.
[27] Nima Jafari Navimipour,et al. A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities , 2016, Comput. Hum. Behav..
[28] Jianhua Wang,et al. Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing , 2017, KSII Trans. Internet Inf. Syst..
[29] Tie Luo,et al. Reshaping Mobile Crowd Sensing Using Cross Validation to Improve Data Credibility , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[30] Li Xu,et al. A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing , 2015, Future Gener. Comput. Syst..
[31] G. Ravi,et al. Attribute Based Encryption With Verifiable Outsourced Decryption , 2014 .
[32] Suat Ozdemir,et al. Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .
[33] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[34] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[35] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[36] Hakima Chaouchi,et al. Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing , 2016, Mob. Inf. Syst..
[37] Xiang-Yang Li,et al. Budget-Feasible Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully , 2016, IEEE/ACM Transactions on Networking.
[38] Hassan Takabi,et al. Mobile Cloud Computing and Its Security, Privacy and Trust Management Challenges , 2013 .
[39] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[40] Jiguo Yu,et al. Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data , 2018, IEEE Transactions on Vehicular Technology.
[41] Jia Guo,et al. A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..
[42] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[43] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.