A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing

Y Zhang, L Xiong, F Li, X Niu, H Wu - Journal of Systems Architecture, 2023 - Elsevier
Blockchain-based authentication mode, a fundamental solution to prevent unauthorized
access behavior, gradually becomes a focus in future distributed mobile cloud computing …

A blockchain-based authentication and authorization scheme for distributed mobile cloud computing services

L Yu, M He, H Liang, L Xiong, Y Liu - Sensors, 2023 - mdpi.com
Authentication and authorization constitute the essential security component, access control,
for preventing unauthorized access to cloud services in mobile cloud computing (MCC) …

Privacy-preserving cloud computing: ecosystem, life cycle, layered architecture and future roadmap

S Ahmadi, M Salehfar - arXiv preprint arXiv:2204.11120, 2022 - arxiv.org
Privacy-Preserving Cloud Computing is an emerging technology with many applications in
various fields. Cloud computing is important because it allows for scalability, adaptability …

A Blockchain‐Based User Authentication Scheme with Access Control for Telehealth Systems

S Shi, M Luo, Y Wen, L Wang… - Security and …, 2022 - Wiley Online Library
With the development of telecommunication systems and customized monitoring devices,
telehealth has been widely used to improve medical quality and reduce overall health costs …

Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service

Y Lu, D Zhao - Computer Communications, 2022 - Elsevier
Mobile cloud computing (MCC) is an emerging computing model with the growing demands
of mobile devices by services diversity using mobile cloud technology. Authentication plays …

Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures

Q Xie, Y Zhao - Mathematics, 2023 - mdpi.com
To support more complex and robust online services, enterprise-class applications prefer to
interconnect multiple servers as the pedestal to enhance the system's interoperability …

Privacy-preserving authentication scheme with revocability for multi-WSN in industrial IoT

L Xiong, T Peng, F Li, S Zeng, H Wu - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Wireless sensor network (WSN), as one of the core technology in the Industrial Internet of
Things (IIoT) system, plays a critical role in collecting data for the monitoring areas. Security …

REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data

Y Miao, F Li, X Jia, H Wang, X Liu… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Keyword-based search over encrypted data is an important technique to achieve both data
confidentiality and utilization in cloud outsourcing services. While commonly used access …

Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services

OO Olakanmi, K Odeyemi - Computers & Security, 2021 - Elsevier
Mobile cloud computing (MCC) combines mobile devices with cloud computing for efficient
extension of infrastructures and cloud services to mobile devices using the existing mobile …

A Multi Server Authentication Protocol With Integrated Monitoring for IoMT Based Healthcare System

Q Xie, Y Zhao, Q Xie, X Li, D He… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Internet of Medical Things based healthcare system (IoMTHS) is a kind of industrial
information system that integrates life monitoring, pathological inference and drug therapy …