Security concerns over IoT routing using emerging technologies: a review

R Kumar, A Malik, V Ranga - Transactions on Emerging …, 2023 - Wiley Online Library
Abstract The Internet of Things (IoT) provides a way to reach every hidden corner of the
universe and provides valuable information for exploring the universe. With the …

One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage

X Liu, W Sun, W Lou, Q Pei… - IEEE INFOCOM 2017 …, 2017 - ieeexplore.ieee.org
In this paper, we investigate the problem of integrity auditing for cloud deduplication storage.
Specifically, in addition to the outsourced data confidentiality, we also aim to ensure the …

A survey of verifiable computation

X Yu, Z Yan, AV Vasilakos - Mobile Networks and Applications, 2017 - Springer
Abstract Internet of Things (IoT) has taken place to motivate various intelligent applications
with the data collected by the things”. Meanwhile, Cloud computing offers an efficient and …

DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems

A Fu, Y Li, S Yu, Y Yu, G Zhang - Journal of Network and Computer …, 2018 - Elsevier
As cloud storage has become more and more ubiquitous, there are a large number of
consumers renting cloud storage services. However, as users lose direct control over the …

Efficient client-side deduplication of encrypted data with public auditing in cloud storage

TY Youn, KY Chang, KH Rhee, SU Shin - IEEE Access, 2018 - ieeexplore.ieee.org
At present, there is a considerable increase in the amount of data stored in storage services,
along with dramatic evolution of networking techniques. In storage services with huge data …

New provable data transfer from provable data possession and deletion for secure cloud storage

Y Liu, S Xiao, H Wang… - International Journal of …, 2019 - journals.sagepub.com
With the continuous and rapid development of cloud computing, it becomes more popular for
users to outsource large-scale data files to cloud servers for storage and computation …

Privacy-preserving outsourced inner product computation on encrypted database

H Yang, Y Su, J Qin, H Wang - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider an outsourced computation model in the selective data sharing setting.
Specifically, one of the data owners outsources the encrypted data to an untrusted cloud …

Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing

J Yan, J Chen, C Qian, A Fu, H Qian - Journal of Systems Architecture, 2024 - Elsevier
In cloud computing, the current challenge lies in managing massive data, which is a
computationally overburdened environment for data users. Outsourced computation can …

Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting

XA Wang, Y Liu, AK Sangaiah, J Zhang - Computing, 2019 - Springer
With the continuous development of the internet of things (IoT) technology, large amount of
data has been generated by lots of IoT devices which require large-scale data processing …

Privacy-preserving and verifiable data aggregation for Internet of Vehicles

F Zhou, Q Wu, P Wu, J Xu, D Feng - Computer Communications, 2024 - Elsevier
With the development of Internet of Vehicles (IoV), organizations or institutions are
increasingly interested in aggregating vehicle perception data to perform data analysis …