Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Blockchain for large-scale internet of things data storage and protection

R Li, T Song, B Mei, H Li, X Cheng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the dramatically increasing deployment of IoT devices, storing and protecting the large
volume of IoT data has become a significant issue. Traditional cloud-based IoT structures …

A blockchain-based mutual authentication scheme for collaborative edge computing

G Cheng, Y Chen, S Deng, H Gao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the ever-increasing requirements of delay-sensitive and mission-critical applications, it
becomes a popular research trend to incorporate edge computing in the Internet of Things …

An efficient certificateless encryption for secure data sharing in public clouds

SH Seo, M Nabeel, X Ding… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We propose a mediated certificateless encryption scheme without pairing operations for
securely sharing sensitive information in public clouds. Mediated certificateless public key …

Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model

JK Liu, MH Au, W Susilo - Proceedings of the 2nd ACM symposium on …, 2007 - dl.acm.org
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-
Based Cryptography (IBC) while without having the problem of key escrow. However, it does …

Fine-grained two-factor access control for web-based cloud computing services

JK Liu, MH Au, X Huang, R Lu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we introduce a new fine-grained two-factor authentication (2FA) access control
system for web-based cloud computing services. Specifically, in our proposed 2FA access …

Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data

Y Yang, JK Liu, K Liang, KKR Choo, J Zhou - … Security--ESORICS 2015 …, 2015 - Springer
Attribute-based encryption has the potential to be deployed in a cloud computing
environment to provide scalable and fine-grained data sharing. However, user revocation …

Two-factor data security protection mechanism for cloud storage system

JK Liu, K Liang, W Susilo, J Liu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we propose a two-factor data security protection mechanism with factor
revocability for cloud storage system. Our system allows a sender to send an encrypted …

Hybrid design for cloud data security using combination of AES, ECC and LSB steganography

O Hosam, MH Ahmad - International Journal of …, 2019 - inderscienceonline.com
The ever-growing popularity of cloud systems is prompting a revolutionary change in
information technology field. Parallel and flexible services offered by cloud technology are …

Certificateless signatures: new schemes and security models

X Huang, Y Mu, W Susilo, DS Wong… - The computer …, 2012 - academic.oup.com
We present a study of security in certificateless signatures. We divide potential adversaries
according to their attack power, and for the first time, three new kinds of adversaries are …