Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A survey on IoT security: application areas, security threats, and solution architectures

V Hassija, V Chamola, V Saxena, D Jain, P Goyal… - IEEe …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …

Blockchain-based medical records secure storage and medical service framework

Y Chen, S Ding, Z Xu, H Zheng, S Yang - Journal of medical systems, 2019 - Springer
Accurate and complete medical data are one valuable asset for patients. Privacy protection
and the secure storage of medical data are crucial issues during medical services. Secure …

Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks

K Gai, Y Wu, L Zhu, L Xu… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The blooming trend of smart grid deployment is engaged by the evolution of the network
technology, as the connected environment offers various alternatives for electrical data …

Security and privacy in smart health: Efficient policy-hiding attribute-based access control

Y Zhang, D Zheng, RH Deng - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the rapid development of the Internet of Things and cloud computing technologies,
smart health (s-health) is expected to significantly improve the quality of health care …

[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.

JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …

[PDF][PDF] Data security, privacy, availability and integrity in cloud computing: issues and current solutions

S Aldossary, W Allen - International Journal of Advanced …, 2016 - pdfs.semanticscholar.org
Cloud computing changed the world around us. Now people are moving their data to the
cloud since data is getting bigger and needs to be accessible from many devices. Therefore …

Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage

B Cui, Z Liu, L Wang - IEEE Transactions on computers, 2015 - ieeexplore.ieee.org
The capability of selectively sharing encrypted data with different users via public cloud
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key …

From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …