A Narrative Review of Identity, Data and Location Privacy Techniques in Edge Computing and Mobile Crowdsourcing

SR Bashir, S Raza, V Misic - Electronics, 2024 - search.proquest.com
As digital technology advances, the proliferation of connected devices poses significant
challenges and opportunities in mobile crowdsourcing and edge computing. This narrative …

Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption

B Zhang, T Zhang, Z Xi, P Chen, J Wei, Y Liu - Electronics, 2024 - mdpi.com
With the rapid development of the Internet of Things (IoT), ensuring secure communication
between devices has become a crucial challenge. This paper proposes a novel secure …

Cloud-based Task Scheduling in a Secure Data-Sharing Scheme using a Cloud Environment

N Karthigavani, CB Mayurie - 2024 First International …, 2024 - ieeexplore.ieee.org
Because of the dynamic nature of data dissemination in cloud computing, traditional
database views in conventional architecture present several issues for data miners. This …

Enhanced Framework for Authentic and Anonymous Data Sharing Over Cloud Storage Service

A Naik, M Anjali, P Ushashree… - … Conference on Intelligent …, 2024 - ieeexplore.ieee.org
This study introduces the concept of anonymous data exchange in banking applications
using cloud computing. By intertwining innovative methodologies, the proposed framework …