A context-aware encryption protocol suite for edge computing-based IoT devices

Z Dar, A Ahmad, FA Khan, F Zeshan, R Iqbal… - The Journal of …, 2020 - Springer
… This paper addressed this issue and proposed a context-aware encryption protocol suit
for edge computing-based IoT systems which adapts the encryption algorithm based on the …

A secure and efficient ECC-based scheme for edge computing and internet of things

H AlMajed, A AlMogren - Sensors, 2020 - mdpi.com
… This study’s main contribution is to offer a secure and efficient encryption scheme in the
form of ECC. It facilitates secure communication by creating a shared key for a group of parties, …

Channel coding scheme for relay edge computing wireless networks via homomorphic encryption and NOMA

F Hu, B Chen - IEEE Transactions on Cognitive …, 2020 - ieeexplore.ieee.org
… based privacy-preserving and homomorphic encryption scheme in multi-hop wireless …
A SCMA-based edge computing scheme is proposed in [32] to improve network connectivity …

An efficient and secure aggregation encryption scheme in edge computing

J Wu, X Sheng, G Li, K Yu, J Liu - China Communications, 2022 - ieeexplore.ieee.org
… It can be said that the scheme in this chapter is better than the encryption scheme in [20–23].
Scheme performance comparison. We comparied the resist external attack, resist internal …

Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme

J Cui, L Wei, H Zhong, J Zhang, Y Xu… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
… downloading scheme for VANETs, based on the edge computing concept. In the proposed
scheme, a roadside unit (RSU) can find the popular data by analyzing the encrypted requests …

… data security and privacy using Carmichael's theorem-based homomorphic encryption and modified enhanced homomorphic encryption schemes in edge computing …

KA Kumari, A Sharma, C Chakraborty, M Ananyaa - Big Data, 2022 - liebertpub.com
edge computing system is deployed for the current work. As a future work, the proposed
schemes … As a future work, the proposed schemes can be enhanced further under a very large …

TMO: time domain outsourcing attribute-based encryption scheme for data acquisition in edge computing

Y Li, Z Dong, K Sha, C Jiang, J Wan, Y Wang - IEEE Access, 2019 - ieeexplore.ieee.org
… and devices in edge computing makes the security issue even more difficult [10], [11], users’
… -based encryption scheme in this paper to enhance the data security in the edge computing

Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things

S Niu, Y Hu, Y Su, S Yan, S Zhou - Journal of Systems Architecture, 2023 - Elsevier
… the edge server, which can ensure data privacy and reduce the risk of raw data leakage [1].
Edge computing will … Therefore, we introduce online/offline technology to improve encryption

Survey on edge computing security

H Zeyu, X Geming, W Zhaohang… - … Conference on Big Data …, 2020 - ieeexplore.ieee.org
… By analyzing the security challenges of edge computing in the … out the security problems of
edge computing in five aspects, … encryption scheme is highly scalable, and only a few edge

Public-key encryption secure against related randomness attacks for improved end-to-end security of cloud/edge computing

P Liu - IEEE Access, 2020 - ieeexplore.ieee.org
… Related randomness attacks model (RRA) for public-key encryption was … -key encryption
scheme against related randomness attacks, ie RRA-CPA secure public-key encryption scheme