A survey on privacy and access control schemes in fog computing

To provide reliable data storage and retrieval services to the end users, the cloud service provider implements secure data storage, sharing, and retrieval mechanisms. However, the aforesaid servic ...

[1]  Zhiwei Wang Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing , 2018, Future Gener. Comput. Syst..

[2]  Yonghong Chen,et al.  Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.

[3]  Josep Domingo-Ferrer,et al.  Anonymous and secure aggregation scheme in fog-based public cloud computing , 2018, Future Gener. Comput. Syst..

[4]  Jian Shen,et al.  Secure intelligent traffic light control using fog computing , 2018, Future Gener. Comput. Syst..

[5]  Jian Yang,et al.  Network softwarization and parallel networks: beyond software-defined networks , 2016, IEEE Network.

[6]  BottaAlessio,et al.  Integration of Cloud computing and Internet of Things , 2016 .

[7]  WADOOD ABDUL,et al.  Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.

[8]  Tie Qiu,et al.  Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.

[9]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[10]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[11]  Mianxiong Dong,et al.  Control Plane Optimization in Software-Defined Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.

[12]  Xiaohui Liang,et al.  Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.

[13]  Joel J. P. C. Rodrigues,et al.  An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..

[14]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[15]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[16]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[17]  ParkJong Hyuk,et al.  A survey on cloud computing security , 2016 .

[18]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[19]  Rajkumar Buyya,et al.  An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..

[20]  K JainAnil,et al.  50 years of biometric research , 2016 .

[21]  Allison Bishop,et al.  Achieving Leakage Resilience through Dual System Encryption , 2011, TCC.

[22]  Yasin Kabalci,et al.  A survey on smart metering and smart grid communication , 2016 .

[23]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[24]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[25]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[26]  Ning Zhang,et al.  LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context , 2017, IEEE Access.

[27]  Hao Liang,et al.  Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption , 2016, IEEE Internet of Things Journal.

[28]  Junaid Shuja,et al.  A fog-based security framework for intelligent traffic light control system , 2018, Multimedia Tools and Applications.

[29]  Junbeom Hur,et al.  Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing , 2018, Future Gener. Comput. Syst..

[30]  Kim-Kwang Raymond Choo,et al.  Fog data analytics: A taxonomy and process model , 2019, J. Netw. Comput. Appl..

[31]  Xavier Masip-Bruin,et al.  Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems , 2016, IEEE Wireless Communications.

[32]  Nuttapong Attrapadung,et al.  Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More , 2014, IACR Cryptol. ePrint Arch..

[33]  Mohammad Abdullah Al Faruque,et al.  Energy Management-as-a-Service Over Fog Computing Platform , 2016, IEEE Internet Things J..

[34]  Jian Shen,et al.  Bitcoin-based fair payments for outsourcing computations of fog devices , 2018, Future Gener. Comput. Syst..

[35]  B. P. S. Sahoo,et al.  Cloud Computing Features, Issues, and Challenges: A Big Picture , 2015, 2015 International Conference on Computational Intelligence and Networks.

[36]  Kim-Kwang Raymond Choo,et al.  A foggy research future: Advances and future opportunities in fog computing research , 2018, Future Gener. Comput. Syst..

[37]  Athanasios Fevgas,et al.  An internet of things architecture for preserving privacy of energy consumption , 2016 .

[38]  David M. Eyers,et al.  Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.

[39]  Lei Zhou,et al.  A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[40]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[41]  Steven P. Weber,et al.  Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017, IEEE Systems Journal.

[42]  Hesham Rakha,et al.  Intersection Management via Vehicle Connectivity: The Intersection Cooperative Adaptive Cruise Control System Concept , 2016, J. Intell. Transp. Syst..

[43]  Yanmin Zhu,et al.  A Survey on Trajectory Data Mining: Techniques and Applications , 2016, IEEE Access.

[44]  Hannu Tenhunen,et al.  End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..

[45]  Man Ho Au,et al.  Towards leakage-resilient fine-grained access control in fog computing , 2018, Future Gener. Comput. Syst..

[46]  Zoe L. Jiang,et al.  A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[47]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[48]  Yaser Jararweh,et al.  Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks , 2018, Trans. Emerg. Telecommun. Technol..

[49]  Arwa Alrawais,et al.  An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.

[50]  Hamid Sharif,et al.  A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.

[51]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[52]  Tansu Alpcan,et al.  Fog Computing May Help to Save Energy in Cloud Computing , 2016, IEEE Journal on Selected Areas in Communications.

[53]  HuangXinyi,et al.  An overview of Fog computing and its security issues , 2016 .

[54]  Suat Ozdemir,et al.  A secure data aggregation protocol for fog computing based smart grids , 2018, 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018).

[55]  Rajkumar Buyya,et al.  Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.

[56]  Toni Janevski,et al.  5G and the Fog — Survey of related technologies and research directions , 2016, 2016 18th Mediterranean Electrotechnical Conference (MELECON).

[57]  Min Ji,et al.  CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..

[58]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[59]  Hongwei Liu,et al.  An efficient access control scheme with outsourcing capability and attribute update for fog computing , 2018, Future Gener. Comput. Syst..

[60]  Alberto Zanella,et al.  Position based routing in crowd sensing vehicular networks , 2016, Ad Hoc Networks.

[61]  Lingyu Wang,et al.  Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage , 2016, IEEE Transactions on Computers.

[62]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[63]  Robert H. Deng,et al.  Hybrid privacy-preserving clinical decision support system in fog-cloud computing , 2018, Future Gener. Comput. Syst..

[64]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[65]  Colin Boyd,et al.  Attribute-Based Authenticated Key Exchange , 2010, ACISP.

[66]  Chunqiang Hu,et al.  LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing , 2017, IEEE Internet of Things Journal.

[67]  Tapani Ristaniemi,et al.  Reliable and Privacy-Preserving Task Recomposition for Crowdsensing in Vehicular Fog Computing , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[68]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[69]  Xiaodong Lin,et al.  A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.

[70]  Mahesh Sooriyabandara,et al.  Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities , 2011, IEEE Communications Surveys & Tutorials.

[71]  Laurence T. Yang,et al.  Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[72]  Fuchun Guo,et al.  Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing , 2018, Future Gener. Comput. Syst..

[73]  Yaser Jararweh,et al.  An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.

[74]  Manuel Díaz,et al.  State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing , 2016, J. Netw. Comput. Appl..

[75]  G. P. Biswas,et al.  Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography , 2016, Wirel. Pers. Commun..

[76]  Khaled Salah,et al.  Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions , 2019, Int. J. Distributed Sens. Networks.

[77]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[78]  MengChu Zhou,et al.  Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..

[79]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[80]  Arun Ross,et al.  50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..

[81]  Jonathan E. Fieldsend,et al.  A Framework of Fog Computing: Architecture, Challenges, and Optimization , 2017, IEEE Access.

[82]  Keke Gai,et al.  Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.

[83]  Jinjun Chen,et al.  Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.

[84]  QiuMeikang,et al.  Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016 .

[85]  Kim-Kwang Raymond Choo,et al.  Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data , 2018, Future Gener. Comput. Syst..

[86]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[87]  Maged Hamada Ibrahim,et al.  Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..