Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Security, privacy, and access control in information-centric networking: A survey

R Tourani, S Misra, T Mick… - … communications surveys & …, 2017 - ieeexplore.ieee.org
Information-centric networking (ICN) replaces the widely used host-centric networking
paradigm in communication networks (eg, Internet and mobile ad hoc networks) with an …

A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain

KOBO Agyekum, Q Xia, EB Sifah… - IEEE Systems …, 2021 - ieeexplore.ieee.org
The evolution of the Internet of Things has seen data sharing as one of its most useful
applications in cloud computing. As eye-catching as this technology has been, data security …

Recent advances in information-centric networking-based Internet of Things (ICN-IoT)

S Arshad, MA Azam, MH Rehmani… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Information-centric networking (ICN) is being realized as a promising approach to
accomplish the shortcomings of current Internet protocol-address-based networking. ICN …

A survey of Internet of Things communication using ICN: A use case perspective

B Nour, K Sharif, F Li, S Biswas, H Moungla… - Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) has gained extensive attention from industry and academia
alike in past decade. The connectivity of each and every piece of technology in the …

Flexible attribute-based proxy re-encryption for efficient data sharing

H Deng, Z Qin, Q Wu, Z Guan, Y Zhou - Information Sciences, 2020 - Elsevier
An increasing number of people are sharing their data through third-party platforms. Attribute-
based encryption (ABE) is a promising primitive that allows enforcing fine-grained access …

Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems

Y Lu, D Wang, MS Obaidat… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Cyber–physical system (CPS) provides a foundation for the Industrial Internet of Things
(IIoT) that interconnects all types of devices. The integration of CPS with IIoT generates the …

SBAC: A secure blockchain-based access control framework for information-centric networking

Q Lyu, Y Qi, X Zhang, H Liu, Q Wang… - Journal of Network and …, 2020 - Elsevier
The information-centric networking (ICN) has been proposed to meet the increasing demand
for efficient content delivery. However, the in-network caching mechanism of ICN makes it …

Secure crowd-sensing protocol for fog-based vehicular cloud

L Nkenyereye, SMR Islam, M Bilal… - Future Generation …, 2021 - Elsevier
The new paradigm of fog computing was extended from conventional cloud computing to
provide computing and storage capabilities at the edge of the network. Applied to vehicular …

Access control mechanisms in named data networks: A comprehensive survey

B Nour, H Khelifi, R Hussain, S Mastorakis… - Acm computing …, 2021 - dl.acm.org
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the
Future Internet Architecture (FIA) that addresses existing issues with the host-centric …