Machine learning enabled industrial iot security: Challenges, trends and solutions

C Ni, SC Li - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract Introduction: The increasingly integrated Industrial IoT (IIoT) with industrial systems
brings benefits such as intelligent analytics, predictive maintenance, and remote monitoring …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J Xia… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

Key escrow-free attribute based encryption with user revocation

R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022 - Elsevier
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE).
The key generator center issues all users' secret keys and can decrypt each ciphertext by …

TRAC: Traceable and revocable access control scheme for mHealth in 5G-enabled IIoT

Q Li, B Xia, H Huang, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile healthcare (mHealth) enables people to collect and share their personal health
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …

Efficient CP-ABE scheme with shared decryption in cloud storage

N Chen, J Li, Y Zhang, Y Guo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a preferred technology used to access control the data
stored in the cloud servers. However, in many cases, the authorized decryption user may be …

Searchable encryption with access control in industrial internet of things (IIoT)

J Bader, AL Michala - Wireless Communications and Mobile …, 2021 - Wiley Online Library
The technological advancements in the Internet of Things (IoT) and related technologies
lead to revolutionary advancements in many sectors. One of these sectors, is the industrial …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

Chronos: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage

Y Zhang, C Xu, N Cheng, H Li, H Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose Chronos+, an accurate blockchain-based time-stamping scheme for outsourced
data, where both the storage and time-stamping services are provided by cloud service …

Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices

Y Lu, J Li - IEEE Transactions on Mobile Computing, 2021 - ieeexplore.ieee.org
Cloud storage services have grown extensively in recent years. For security and privacy
purposes, sensitive data need to be outsourced to clouds in encrypted form. Searchable …