Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing

[1]  Qian He,et al.  Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.

[2]  Cong Wang,et al.  Enabling Cloud Storage Auditing With Key-Exposure Resistance , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Jianhong Zhang,et al.  Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing , 2019, IEEE Access.

[4]  Binxing Fang,et al.  A Survey on Access Control in the Age of Internet of Things , 2020, IEEE Internet of Things Journal.

[5]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[6]  Xiaojiang Du,et al.  Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid , 2019, IEEE Communications Magazine.

[7]  Shengli Xie,et al.  Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.

[8]  Xiaojiang Du,et al.  CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques , 2021, IEEE Internet of Things Journal.

[9]  Yansen Su,et al.  Resource allocation and trust computing for blockchain-enabled edge computing system , 2021, Comput. Secur..

[10]  Dong In Kim,et al.  Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory , 2018, IEEE Transactions on Vehicular Technology.

[11]  Kim-Kwang Raymond Choo,et al.  A smartphone-based wearable sensors for monitoring real-time physiological data , 2017, Comput. Electr. Eng..

[12]  Cong Wang,et al.  Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates , 2016, IEEE Transactions on Information Forensics and Security.

[13]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[14]  Zhe Xia,et al.  Secure Index for Resource-Constraint Mobile Devices in Cloud Computing , 2016, IEEE Access.

[15]  Nadra Guizani,et al.  A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks , 2020, IEEE Wireless Communications.

[16]  Jong-Hyouk Lee,et al.  A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing , 2020, IEEE Internet of Things Journal.

[17]  Zhi Ding,et al.  Wireless communications in the era of big data , 2015, IEEE Communications Magazine.

[18]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[19]  Kai Fan,et al.  Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing , 2018, 2018 IEEE International Conference on Edge Computing (EDGE).

[20]  Ali Kashif Bashir,et al.  Data mining and machine learning methods for sustainable smart cities traffic classification: A survey , 2020, Sustainable Cities and Society.

[21]  Xiaojiang Du,et al.  Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city , 2020, Future Gener. Comput. Syst..

[22]  Xiaojiang Du,et al.  IoT malicious traffic identification using wrapper-based feature selection mechanisms , 2020, Comput. Secur..

[23]  Tao Xiang,et al.  Secure Cloud Storage Meets with Secure Network Coding , 2016, IEEE Transactions on Computers.

[24]  Xiao Xue,et al.  Social Learning Evolution (SLE): Computational Experiment-Based Modeling Framework of Social Manufacturing , 2019, IEEE Transactions on Industrial Informatics.

[25]  Jian Shen,et al.  Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.

[26]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[27]  Lajos Hanzo,et al.  Wireless information and power transfer: from scientific hypothesis to engineering practice , 2015, IEEE Communications Magazine.

[28]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..