A secure and privacy-preserving machine learning model sharing scheme for edge-enabled IoT

X Zhou, K Xu, N Wang, J Jiao, N Dong, M Han… - IEEE Access, 2021 - ieeexplore.ieee.org
With the popular use of IoT devices, edge computing has been widely applied in the Internet
of things (IoT) and regarded as a promising solution for its wide distribution, decentralization …

Everything under control: secure data sharing mechanism for cloud-edge computing

Z Song, H Ma, R Zhang, W Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-edge computing is a new paradigm for data sharing. Many computation tasks are
assigned to multiple edge nodes to mitigate the computing burden of the cloud and data is …

dAPRE: Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT

X Li, Y Xie, H Wang, X Su, H Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The explosive growth of the Internet of Things (IoT) data and its analytical applications can
bring convenience to better intelligent life, efficient work and other aspects. However, the …

LBAC: A lightweight blockchain-based access control scheme for the internet of things

X Qin, Y Huang, Z Yang, X Li - Information Sciences, 2021 - Elsevier
Attribute-based encryption (ABE) is considered to be one of the most suitable schemes for
cryptographic access control in the big data environment. But it still faces many challenges …

A ring learning with errors-based ciphertext-policy attribute-based proxy re-encryption scheme for secure big data sharing in cloud environment

J Li, J Peng, Z Qiao - Big Data, 2022 - liebertpub.com
Owing to the huge volume of big data, users generally use the cloud to store big data.
However, because the data are out of the control of users, sensitive data need to be …

FABRIC: Fast and secure unbounded cross-system encrypted data sharing in cloud computing

L Wang, Y Lin, T Yao, H Xiong… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges
such as supporting the heterogeneous system efficiently and achieving the unbounded …

Efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT

L Li, Z Wang, NA Li - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT
to provide efficient services by extending the cloud computing paradigm to the edge of the …

A secured proxy-based data sharing module in IoT environments using blockchain

KOB Obour Agyekum, Q Xia, EB Sifah, J Gao, H Xia… - Sensors, 2019 - mdpi.com
Access and utilization of data are central to the cloud computing paradigm. With the advent
of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous …

Lightweight federated learning for large-scale IoT devices with privacy guarantee

Z Wei, Q Pei, N Zhang, X Liu, C Wu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the massive deployment of the Internet of Things (IoT) devices, many data analysis
applications emerge for the large amount of data accumulated by IoT. Federated learning …

Federated deep reinforcement learning based secure data sharing for Internet of Things

Q Miao, H Lin, X Wang, MM Hassan - Computer Networks, 2021 - Elsevier
The increasing number of Internet of Things (IoT) devices motivate the data sharing that
improves the quality of IoT services. However, data providers usually suffer from the privacy …