A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …

A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues

ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters… - Sensors, 2020 - mdpi.com
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an
overwhelming flow of data and services, which has shifted the access control paradigm from …

Blockchain-enhanced data sharing with traceable and direct revocation in IIoT

K Yu, L Tan, M Aloqaily, H Yang… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
The industrial Internet of Things (IIoT) supports recent developments in data management
and information services, as well as services for smart factories. Nowadays, many mature …

Towards secure and privacy-preserving data sharing for COVID-19 medical records: A blockchain-empowered approach

L Tan, K Yu, N Shi, C Yang, W Wei… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
COVID-19 is currently a major global public health challenge. In the battle against the
outbreak of COVID-19, how to manage and share the COVID-19 Electric Medical Records …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

Blockchain-based secure data storage protocol for sensors in the industrial internet of things

J Lu, J Shen, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) that introduces Internet of Things (IoT) technology into
industrial environments is beneficial to construct smart factories. It utilizes various sensors to …

[HTML][HTML] A blockchain-empowered AAA scheme in the large-scale HetNet

N Shi, L Tan, W Li, X Qi, K Yu - Digital Communications and Networks, 2021 - Elsevier
Abstract A Large-Scale Heterogeneous Network (LS-HetNet) integrates different networks
into one uniform network system to provide seamless one-world network coverage. In LS …

Lightweight fine-grained search over encrypted data in fog computing

Y Miao, J Ma, X Liu, J Weng, H Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Fog computing, as an extension of cloud computing, outsources the encrypted sensitive data
to multiple fog nodes on the edge of Internet of Things (IoT) to decrease latency and network …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …