Network security situation prediction based on MR-SVM

J Hu, D Ma, C Liu, Z Shi, H Yan, C Hu - IEEE Access, 2019 - ieeexplore.ieee.org
The support vector machine (SVM) is verified to be effective for predicting cyber security
situations, however, the long training time of the prediction model is a drawback to its use …

Enhanced cloud storage encryption standard for security in distributed environments

S Kautish, S Juneja, K Mohiuddin, FK Karim… - Electronics, 2023 - mdpi.com
With the growing number of cloud users, shared data auditing is becoming increasingly
important. However, these schemes have issues with the certificate management. Although …

Secure fog-assisted crowdsensing with collusion resistance: From data reporting to data requesting

L Zhu, M Li, Z Zhang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
The development and ubiquity of smart mobile devices have produced the idea of
crowdsensing, where people report and request data in a community via a cloud server …

A blockchain-based storage system with financial incentives for load-balancing

H Yin, Z Zhang, L Zhu, M Li, X Du… - … on Network Science …, 2020 - ieeexplore.ieee.org
Most storage systems adopt distributed architecture to reach high reliability. In these
distributed systems, a well-balanced data distribution can improve storage reliability …

Blockchain technology in internet of things

L Zhu, K Gai, M Li - 2019 - Springer
The blockchain-enabled Internet of Things (B-IoT) is deemed a novel technical alternative
that provides network-based services with additional functionalities, benefits, and …

Secure privacy conserving provable data possession (SPC-PDP) framework

I Jayaraman, M Mohammed - Information Systems and e-Business …, 2020 - Springer
The assiduous parade of the state-of-the-art sprouting digital technologies, is disrupting the
smooth, easy-going health care digital ecosystem and forewarns us to manage it …

[HTML][HTML] Cloud trust-driven hierarchical sharing method of Internet of Things information resources

J Zhang - Complexity, 2021 - hindawi.com
Short information sharing time is one of the problems to be solved in the traditional Internet.
Therefore, this paper proposes a hierarchical simulation of the Internet of Things sharing …

Fibonacci tree structure based privacy preserving public auditing for IoT enabled data in cloud environment

R Mishra, D Ramesh, DR Edla… - Computers and Electrical …, 2022 - Elsevier
Abstract Presently, Internet of Things (IoT) adopts cloud storage services to facilitate the
efficient integration of IoT devices and the seamless management of collected data …

An extensive research survey on data integrity and deduplication towards privacy in cloud storage

A Kumar, CP Shantala - International Journal of Electrical and …, 2020 - search.proquest.com
Owing to the highly distributed nature of the cloud storage system, it is one of the
challenging tasks to incorporate a higher degree of security towards the vulnerable data …

Design of binary erasure code with triple simultaneous objectives for distributed edge caching in industrial Internet of Things networks

M Dai, H Deng, B Chen, G Su, X Lin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For one moving Internet of Things (IoT) collector to download files from nearby industrial IoT
devices, storing network coded files into multiple IoT devices can achieve good reliability …