[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

Security&privacy issues and challenges in NoSQL databases

S Sicari, A Rizzardi, A Coen-Porisini - Computer Networks, 2022 - Elsevier
Organizing the storing of information and data retrieval from databases is a crucial issue,
which has become more critical with the spreading of cloud and Internet of Things (IoT) …

An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things

J Zhang, Y Yang, X Liu, J Ma - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
With the assistance of the Internet of Things, the fast developing Healthcare Internet of
Things (H-IoT) has promoted the healthcare ecosystem into the era of Health 5.0 and …

A systematic review of task scheduling approaches in fog computing

S Bansal, H Aggarwal… - Transactions on Emerging …, 2022 - Wiley Online Library
Due to increased use of IoT devices and data sensors a huge amount of data is being
produced for processing in real‐time. Fog computing has evolved as a solution for fast …

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing

H Wang, Y Li, W Susilo, DH Duong, F Luo - Computer Standards & …, 2022 - Elsevier
How to use efficient search mechanisms to realize data sharing while ensuring data security
has become an important research topic at present. In this paper, we propose a new …

Toward secure and privacy-preserving cloud data sharing: Online/offline multiauthority CP-ABE with hidden policy

C Zhao, L Xu, J Li, H Fang, Y Zhang - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
The continuous development of cloud storage service technology, secure access control,
and privacy issues have attracted more and more attention. The previous ciphertext policy …

An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing

U Chatterjee, S Ray, MK Khan, M Dasgupta, CM Chen - Computing, 2022 - Springer
Fog computing is a computing structure which is distributed in nature. Low latency,
reasonably low communication overhead and ability to support real time applications are the …

Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems

X Zhang, X Wang, D Gu, J Xue… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cloud computing provides users with convenient data storage services, which
simultaneously poses various security concerns, the integrity of outsourced data has been …

Fog-enabled secure and efficient fine-grained searchable data sharing and management scheme for IoT-based healthcare systems

BB Gupta, MD Lytras - IEEE Transactions on Engineering …, 2022 - ieeexplore.ieee.org
In recent times, fog computing has emerged as a helpful extension of cloud computing. It can
efficiently handle the prevalent issue of managing silos of data generated by today's digital …

[HTML][HTML] Medical data security of wearable tele-rehabilitation under internet of things

K Wang, S Xie, J Rodrigues - Internet of Things and Cyber-Physical …, 2022 - Elsevier
Abstract The Internet of Things (IoT)-based intelligent medical system contains confidential
and sensitive information of patients. Most of the data is related to the patient's medical …