Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city

S Singh, PK Sharma, B Yoon, M Shojafar… - Sustainable cities and …, 2020 - Elsevier
In the digital era, the smart city can become an intelligent society by utilizing advances in
emerging technologies. Specifically, the rapid adoption of blockchain technology has led a …

[HTML][HTML] On blockchain and its integration with IoT. Challenges and opportunities

A Reyna, C Martín, J Chen, E Soler, M Díaz - Future generation computer …, 2018 - Elsevier
Abstract In the Internet of Things (IoT) vision, conventional devices become smart and
autonomous. This vision is turning into a reality thanks to advances in technology, but there …

A survey on security challenges in cloud computing: issues, threats, and solutions

H Tabrizchi, M Kuchaki Rafsanjani - The journal of supercomputing, 2020 - Springer
Cloud computing has gained huge attention over the past decades because of continuously
increasing demands. There are several advantages to organizations moving toward cloud …

Survey on blockchain for Internet of Things

X Wang, X Zha, W Ni, RP Liu, YJ Guo, X Niu… - Computer …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is poised to transform human life and unleash
enormous economic benefit. However, inadequate data security and trust of current IoT are …

Cybersecurity Architecture for the Cloud: Protecting Network in a Virtual Environment

AA Mughal - International Journal of Intelligent Automation …, 2021 - research.tensorgate.org
The use of cloud computing has increased the threat of cyber attacks and data breaches,
making a strong cloud cybersecurity architecture crucial for organizations. The architecture …

[PDF][PDF] Impact of controls on data integrity and information systems

S Duggineni - Science and Technology, 2023 - researchgate.net
Data has changed and revolutionized the world around us. With the amount of data use and
its need increasing every day, there comes an essential responsibility and a requirement of …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Distributed statistical machine learning in adversarial settings: Byzantine gradient descent

Y Chen, L Su, J Xu - Proceedings of the ACM on Measurement and …, 2017 - dl.acm.org
We consider the distributed statistical learning problem over decentralized systems that are
prone to adversarial attacks. This setup arises in many practical applications, including …

Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

[PDF][PDF] Strategic Survey on Security and Privacy Methods of Cloud Computing Environment

SS Vellela, R Balamanigandan… - Journal of Next …, 2022 - jnxtgentech.com
This analysis implements a strategic review on cloud computing environment confidentiality
and privacy approaches. In an IT sector, the recently discovering phenomenal technology is …