Recent security trends in internet of things: A comprehensive survey

Y Harbi, Z Aliouat, A Refoufi, S Harous - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) aims to transform everyday physical objects into an
interconnected ecosystem with digital data accessible anywhere and anytime.“Things” in IoT …

Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things

S Niu, Y Hu, Y Su, S Yan, S Zhou - Journal of Systems Architecture, 2023 - Elsevier
Storing the data generated in the Industrial Internet of Things has become a method to solve
data redundancy. Still, data security and privacy protection have become an issue that …

[HTML][HTML] Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions

A Habbal, H Hamouda, AM Alnajim, S Khan… - Journal of King Saud …, 2024 - Elsevier
Between the changing Industry 4.0 landscape and the rise of Industry 5.0, where human
intelligence and intelligent machines work together, vast amounts of privacy-sensitive data …

Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain

X Yang, G Chen, M Wang, T Li, C Wang - IEEE Access, 2020 - ieeexplore.ieee.org
As a quite attractive secure search mechanism in cloud environments, searchable
encryption allows encrypted files to be searched by keyword and does not reveal any …

A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment

VB Chenam, ST Ali - Journal of Information Security and Applications, 2023 - Elsevier
One of the essential technologies in the medical industry for achieving high performance
and accuracy is the Medical Internet of Things (MIoT). The MIoT technology processes a …

A pairing-free certificateless searchable public key encryption scheme for IoMT

X Liu, Y Sun, H Dong - Journal of Systems architecture, 2023 - Elsevier
To ensure confidentiality, medical information is usually encrypted before it is sent to a third
party for processing. Encryption technology can protect the privacy of data, but it limits the …

A privacy-preserving scheme to support the detection of multiple similar request-real-time services in IoT application systems

AMA Alamer, SAM Basudan, PCK Hung - Expert Systems with Applications, 2023 - Elsevier
Abstract Many Internet of Things (IoT) network and security studies have suggested to
design a secure transmission scheme based on cryptographic methodology to guarantee …

A pairing-free certificateless searchable public key encryption scheme for industrial internet of things

X Liu, H Dong, N Kumari, J Kar - IEEE Access, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) collects a large amount of data through various types
of sensors and intelligently processes this data using cloud computing, which is flexible …

An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data

V Yousefipoor, T Eghlidos - Computers and Electrical Engineering, 2023 - Elsevier
Public key encryption with keyword search (PEKS) is a cryptographic primitive that allows a
secure search for desired keywords of data users by a cloud server using a search token. To …

An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords

M Luo, D Huang, M Qiu - Peer-to-Peer Networking and Applications, 2023 - Springer
Searchable encryption (SE) technology allows users to use keywords to retrieve encrypted
data and ensure that useful plaintext information about encrypted data will not be disclosed …