Non-repudiation storage and access control scheme of insurance data based on blockchain in IPFS

J Sun, X Yao, S Wang, Y Wu - IEEE Access, 2020 - ieeexplore.ieee.org
The insurance business plays a quite significant role in people's lives, but in the process of
claim settlement, there are still various frauds such that the insurance companies' refusal to …

Access control in fog computing: Challenges and research agenda

MA Aleisa, A Abuhussein, FT Sheldon - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is an intermediate computing layer that has emerged to address the latency
issues of cloud-based Internet of things (IoT) environments. As a result, new forms of security …

Multiauthority attribute-based encryption for assuring data deletion

J Li, R Zhang, Y Lu, J Han, Y Zhang… - IEEE Systems …, 2022 - ieeexplore.ieee.org
In order to alleviate key escrow issue, the notion of multiauthority attribute-based encryption
(MA-ABE) was presented, which was widely applied in cloud storage environment. In data …

Storage as a service in fog computing: A systematic review

R Rani, N Kumar, M Khurana, A Kumar… - Journal of Systems …, 2021 - Elsevier
Uses of Internet of things (IoT) devices and sensors have increased to a great extent in
recent years. In order to facilitate computational and storage needs of low powered end …

Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in IoT

Y Chen, W Sun, N Zhang, Q Zheng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As an important application of the Internet of Things, many remote monitoring systems adopt
a device-to-cloud network paradigm. In a remote patient monitoring case, various resource …

Position based cryptography with location privacy: A step for fog computing

R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou - Future Generation …, 2018 - Elsevier
Fog Computing, which has the advantage of both the Cloud Computing and the Internet of
Things, has changed our daily lives. One important property of the Fog Computing is …

Security and privacy based access control model for internet of connected vehicles

MA Habib, M Ahmad, S Jabbar, S Khalid… - Future Generation …, 2019 - Elsevier
Vehicular networks are continually gaining popularity, owing to the evolution of the Internet
of things, by means of rapid communication in IP-based networks. Vehicles are being fitted …

BacS: a blockchain-based access control scheme in distributed internet of things

N Shi, L Tan, C Yang, C He, J Xu, Y Lu, H Xu - Peer-to-peer networking …, 2021 - Springer
Abstract Distributed Internet of Things (Distributed IoT) is a large-scale, heterogeneous,
dynamic distributed architecture environment which is gradually formed based on Internet of …

Encryption as a service for IoT: opportunities, challenges and solutions

A Javadpour, F Ja'fari, T Taleb, Y Zhao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …

Security challenges in fog-computing environment: a systematic appraisal of current developments

J Yakubu, SM Abdulhamid, HA Christopher… - Journal of Reliable …, 2019 - Springer
Fog computing is a new paradigm of computing that extends cloud-computing operations to
the edges of the network. The fog-computing services provide location sensitivity, reduced …