A survey on privacy and access control schemes in fog computing
暂无分享,去创建一个
Abdul Nasir Khan | Mudassar Aslam | Joel J. P. C. Rodrigues | Mazhar Ali | Tauqeer Khalid | Raja Ahmad | Muhammad Abbas Khan Abbasi | Maria Zuraiz | Abdul Nasir Khan | R. Ahmad | Joel Rodrigues | Mazhar Ali | Mudassar Aslam | Muhammad Abbas Khan Abbasi | Tauqeer Khalid | Maria Zuraiz
[1] Zhiwei Wang. Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing , 2018, Future Gener. Comput. Syst..
[2] Yonghong Chen,et al. Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.
[3] Josep Domingo-Ferrer,et al. Anonymous and secure aggregation scheme in fog-based public cloud computing , 2018, Future Gener. Comput. Syst..
[4] Jian Shen,et al. Secure intelligent traffic light control using fog computing , 2018, Future Gener. Comput. Syst..
[5] Jian Yang,et al. Network softwarization and parallel networks: beyond software-defined networks , 2016, IEEE Network.
[6] BottaAlessio,et al. Integration of Cloud computing and Internet of Things , 2016 .
[7] WADOOD ABDUL,et al. Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.
[8] Tie Qiu,et al. Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.
[9] Xiangjian He,et al. Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..
[10] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[11] Mianxiong Dong,et al. Control Plane Optimization in Software-Defined Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.
[12] Xiaohui Liang,et al. Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.
[13] Joel J. P. C. Rodrigues,et al. An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..
[14] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[15] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[16] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[17] ParkJong Hyuk,et al. A survey on cloud computing security , 2016 .
[18] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[19] Rajkumar Buyya,et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..
[20] K JainAnil,et al. 50 years of biometric research , 2016 .
[21] Allison Bishop,et al. Achieving Leakage Resilience through Dual System Encryption , 2011, TCC.
[22] Yasin Kabalci,et al. A survey on smart metering and smart grid communication , 2016 .
[23] Ivan Stojmenovic,et al. An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..
[24] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[25] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[26] Ning Zhang,et al. LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context , 2017, IEEE Access.
[27] Hao Liang,et al. Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption , 2016, IEEE Internet of Things Journal.
[28] Junaid Shuja,et al. A fog-based security framework for intelligent traffic light control system , 2018, Multimedia Tools and Applications.
[29] Junbeom Hur,et al. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing , 2018, Future Gener. Comput. Syst..
[30] Kim-Kwang Raymond Choo,et al. Fog data analytics: A taxonomy and process model , 2019, J. Netw. Comput. Appl..
[31] Xavier Masip-Bruin,et al. Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems , 2016, IEEE Wireless Communications.
[32] Nuttapong Attrapadung,et al. Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More , 2014, IACR Cryptol. ePrint Arch..
[33] Mohammad Abdullah Al Faruque,et al. Energy Management-as-a-Service Over Fog Computing Platform , 2016, IEEE Internet Things J..
[34] Jian Shen,et al. Bitcoin-based fair payments for outsourcing computations of fog devices , 2018, Future Gener. Comput. Syst..
[35] B. P. S. Sahoo,et al. Cloud Computing Features, Issues, and Challenges: A Big Picture , 2015, 2015 International Conference on Computational Intelligence and Networks.
[36] Kim-Kwang Raymond Choo,et al. A foggy research future: Advances and future opportunities in fog computing research , 2018, Future Gener. Comput. Syst..
[37] Athanasios Fevgas,et al. An internet of things architecture for preserving privacy of energy consumption , 2016 .
[38] David M. Eyers,et al. Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.
[39] Lei Zhou,et al. A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[40] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[41] Steven P. Weber,et al. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017, IEEE Systems Journal.
[42] Hesham Rakha,et al. Intersection Management via Vehicle Connectivity: The Intersection Cooperative Adaptive Cruise Control System Concept , 2016, J. Intell. Transp. Syst..
[43] Yanmin Zhu,et al. A Survey on Trajectory Data Mining: Techniques and Applications , 2016, IEEE Access.
[44] Hannu Tenhunen,et al. End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..
[45] Man Ho Au,et al. Towards leakage-resilient fine-grained access control in fog computing , 2018, Future Gener. Comput. Syst..
[46] Zoe L. Jiang,et al. A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[47] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..
[48] Yaser Jararweh,et al. Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks , 2018, Trans. Emerg. Telecommun. Technol..
[49] Arwa Alrawais,et al. An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.
[50] Hamid Sharif,et al. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.
[51] F. Richard Yu,et al. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[52] Tansu Alpcan,et al. Fog Computing May Help to Save Energy in Cloud Computing , 2016, IEEE Journal on Selected Areas in Communications.
[53] HuangXinyi,et al. An overview of Fog computing and its security issues , 2016 .
[54] Suat Ozdemir,et al. A secure data aggregation protocol for fog computing based smart grids , 2018, 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018).
[55] Rajkumar Buyya,et al. Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.
[56] Toni Janevski,et al. 5G and the Fog — Survey of related technologies and research directions , 2016, 2016 18th Mediterranean Electrotechnical Conference (MELECON).
[57] Min Ji,et al. CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..
[58] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[59] Hongwei Liu,et al. An efficient access control scheme with outsourcing capability and attribute update for fog computing , 2018, Future Gener. Comput. Syst..
[60] Alberto Zanella,et al. Position based routing in crowd sensing vehicular networks , 2016, Ad Hoc Networks.
[61] Lingyu Wang,et al. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage , 2016, IEEE Transactions on Computers.
[62] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[63] Robert H. Deng,et al. Hybrid privacy-preserving clinical decision support system in fog-cloud computing , 2018, Future Gener. Comput. Syst..
[64] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[65] Colin Boyd,et al. Attribute-Based Authenticated Key Exchange , 2010, ACISP.
[66] Chunqiang Hu,et al. LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing , 2017, IEEE Internet of Things Journal.
[67] Tapani Ristaniemi,et al. Reliable and Privacy-Preserving Task Recomposition for Crowdsensing in Vehicular Fog Computing , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
[68] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[69] Xiaodong Lin,et al. A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.
[70] Mahesh Sooriyabandara,et al. Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities , 2011, IEEE Communications Surveys & Tutorials.
[71] Laurence T. Yang,et al. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.
[72] Fuchun Guo,et al. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing , 2018, Future Gener. Comput. Syst..
[73] Yaser Jararweh,et al. An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.
[74] Manuel Díaz,et al. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing , 2016, J. Netw. Comput. Appl..
[75] G. P. Biswas,et al. Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography , 2016, Wirel. Pers. Commun..
[76] Khaled Salah,et al. Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions , 2019, Int. J. Distributed Sens. Networks.
[77] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[78] MengChu Zhou,et al. Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..
[79] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[80] Arun Ross,et al. 50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..
[81] Jonathan E. Fieldsend,et al. A Framework of Fog Computing: Architecture, Challenges, and Optimization , 2017, IEEE Access.
[82] Keke Gai,et al. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.
[83] Jinjun Chen,et al. Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.
[84] QiuMeikang,et al. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016 .
[85] Kim-Kwang Raymond Choo,et al. Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data , 2018, Future Gener. Comput. Syst..
[86] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[87] Maged Hamada Ibrahim,et al. Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..