A survey on privacy preservation in fog-enabled internet of things

K Sarwar, S Yongchareon, J Yu… - ACM Computing Surveys …, 2021 - dl.acm.org
Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical
challenges that need to be addressed before the full adoption of the IoT. Data privacy is one …

Lightweight, divide-and-conquer privacy-preserving data aggregation in fog computing

K Sarwar, S Yongchareon, J Yu… - Future Generation …, 2021 - Elsevier
With the increasing popularity of the Internet of Things'(IoT) and fog computing paradigm,
aggregating IoT data considering privacy concerns over fog networks can be seen as one of …

Principles of Secure Access and Privacy in Combined E-Learning Environment: Architecture, Formalization, and Modelling

RP Romansky, IS Noninska - Multidisciplinary Perspectives on …, 2018 - igi-global.com
Globalization in the contemporary information society outlines new important challenges in
privacy and personal data protection that apply to user security in cyberspace. This is also …

[PDF][PDF] Efficient Privacy-Preserving Data Aggregation and Replication for Fog-Enabled IoT

K Sarwar - 2021 - openrepository.aut.ac.nz
With the increasing popularity of Fog computing to provide computation, analysis and
storage of data at the edge of IoT networks, the fulfilment of data privacy requirements over …

[PDF][PDF] Anonieme autorisatie

J Schutrup - research.ou.nl
We have to log in to many systems every day. Normally, authentication and authorization are
two adjacent steps. By authentication, the user proves his identity, based on which the …