A privacy-preserving trust model based on blockchain for VANETs

Z Lu, W Liu, Q Wang, G Qu, Z Liu - Ieee Access, 2018 - ieeexplore.ieee.org
The public key infrastructure-based authentication protocol provides basic security services
for the vehicular ad hoc networks (VANETs). However, trust and privacy are still open issues …

Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice

Y Zhang, J Li, D Zheng, P Li, Y Tian - Journal of Network and Computer …, 2018 - Elsevier
As an important combination of autonomous vehicle networks (AVNs) and smart grid, the
vehicle-to-grid (V2G) network can facilitate the adoption of renewable resources. Based on …

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things

Y Zhang, RH Deng, G Han, D Zheng - Journal of Network and Computer …, 2018 - Elsevier
With the rapid technological advancements in the Internet of Things (IoT), wireless
communication and cloud computing, smart health is expected to enable comprehensive …

Privacy-preserving data aggregation against false data injection attacks in fog computing

Y Zhang, J Zhao, D Zheng, K Deng, F Ren, X Zheng… - Sensors, 2018 - mdpi.com
As an extension of cloud computing, fog computing has received more attention in recent
years. It can solve problems such as high latency, lack of support for mobility and location …

Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing

A Wu, D Zheng, Y Zhang, M Yang - Sensors, 2018 - mdpi.com
Attribute-based encryption can be used to realize fine-grained data sharing in open
networks. However, in practical applications, we have to address further challenging issues …

Efficient and secure big data storage system with leakage resilience in cloud computing

Y Zhang, M Yang, D Zheng, P Lang, A Wu, C Chen - Soft Computing, 2018 - Springer
With recent advancements in wireless smart terminal manufacture and communication
technologies, a huge amount of data are generated from a variety of sources including …

Smart grid power trading based on consortium blockchain in internet of things

D Zheng, K Deng, Y Zhang, J Zhao, X Zheng… - … conference on algorithms …, 2018 - Springer
Abstract Internet of Things (IoT) technologies have attracted enormous attention from
academics and industries, and one of the most representative application is the smart grid …

Consortium blockchain-based SIFT: Outsourcing encrypted feature extraction in the D2D network

X Feng, J Ma, T Feng, Y Miao, X Liu - IEEE Access, 2018 - ieeexplore.ieee.org
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users'
storage and computation overhead but also preserve the image privacy. However, the …

Secure deduplication based on Rabin fingerprinting over wireless sensing data in cloud computing

Y Zhang, H Su, M Yang, D Zheng… - Security and …, 2018 - Wiley Online Library
The rapid advancements in the Internet of Things (IoT) and cloud computing technologies
have significantly promoted the collection and sharing of various data. In order to reduce the …

[PDF][PDF] Exploring Permissioned Blockchains for Decentralizing Access Control

HFCS Martins - 2018 - researchgate.net
Protecting sensitive or private information is of the utmost importance. Information breaches,
and sharing of sensitive information can have serious legal, reputation and financial impacts …