Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

Blockchain-based public auditing for big data in cloud storage

J Li, J Wu, G Jiang, T Srikanthan - Information Processing & Management, 2020 - Elsevier
Cloud storage enables applications to efficiently manage their remote data but facing the
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

Q Zhao, S Chen, Z Liu, T Baker, Y Zhang - Information Processing & …, 2020 - Elsevier
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …

Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …

A blockchain-enabled deduplicatable data auditing mechanism for network storage services

Y Xu, C Zhang, G Wang, Z Qin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Since network storage services achieve widespread adoption, security and performance
issues are becoming primary concerns, affecting the scalability of storage systems …

Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H Jin, Y Xiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

Block-secure: Blockchain based scheme for secure P2P cloud storage

J Li, J Wu, L Chen - Information Sciences, 2018 - Elsevier
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …

Enabling efficient user revocation in identity-based cloud storage auditing for shared big data

Y Zhang, J Yu, R Hao, C Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud storage auditing schemes for shared data refer to checking the integrity of cloud data
shared by a group of users. User revocation is commonly supported in such schemes, as …

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …