[HTML][HTML] Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions

A Yao, G Li, X Li, F Jiang, J Xu, X Liu - Array, 2023 - Elsevier
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …

Edge-based auditing method for data security in resource-constrained internet of things

T Wang, Y Mei, X Liu, J Wang, HN Dai… - Journal of Systems …, 2021 - Elsevier
The explosive generation of Internet of Things (IoT) data calls for cloud service providers
(CSP) to further provide more secure and reliable transmission, storage, and management …

Secure data sharing: blockchain-enabled data access control framework for IoT

X Wei, Y Yan, S Guo, X Qiu, F Qi - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
As Internet-of-Things (IoT) service becomes richer, data sharing among different IoT systems
gets popular. The traditional IoT system provides data storage and access service with the …

Edge computing: A systematic mapping study

J Sakhdari, B Zolfaghari, S Izadpanah… - Concurrency and …, 2023 - Wiley Online Library
Edge computing is a new way of computing that uses resources at the edge of a network to
solve the problem of communication delays in applications that require immediate …

[HTML][HTML] A computer-aided feature-based encryption model with concealed access structure for medical Internet of Things

S Vaidya, A Suri, V Batla, I Keshta, SSM Ajibade… - Decision Analytics …, 2023 - Elsevier
One of the Internet of Things (IoT) security issues is the secure sharing and granular
management of data access. This study recommends a feature-based encryption scheme …

[PDF][PDF] Cloud-edge intelligence: Status quo and future prospective of edge computing approaches and applications in power system operation and control

B Yu-Yang, H Yan-Hao, C Si-Yuan, Z Jun… - Acta Automatica …, 2020 - aas.net.cn
In this paper, the current challenges faced by China′ s power grid are analyzed, and the
corresponding developmental background and key techniques of edge computing are …

Lightweight Fine‐Grained Multiowner Search over Encrypted Data in Cloud‐Edge Computing

XY Liu, LJ Huan, RR Sun… - Security and …, 2023 - Wiley Online Library
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data
to edge nodes to decrease latency and improve broadband efficiency. Although attribute …

[PDF][PDF] A trusted medical data sharing framework for edge computing leveraging blockchain and outsourced computation

G Quan, Z Yao, L Chen, Y Fang, W Zhu, X Si, M Li - Heliyon, 2023 - cell.com
Traditional cloud-centric approaches to medical data sharing pose risks related to real-time
performance, security, and stability. Medical and healthcare data encounter challenges like …

Minimizing data breach by a malicious fog node within a fog federation

M Alshehri, B Panda - … Conference on Cyber Security and Cloud …, 2020 - ieeexplore.ieee.org
Fog computing was emerged as mini-clouds deployed close to the ground to reduce
communication overhead and time latency between the cloud and end-users' devices …

The role of Edge/Fog computing security in IoT and Industry 4.0 infrastructures: Edge/Fog-based security in Internet of Things

M Mutluturk, B Kor, B Metin - … of research on information and records …, 2021 - igi-global.com
The development of information and communication technologies (ICT) has led to many
innovative technologies. The integration of technologies such as the internet of things (IoT) …