Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

Security and privacy in big data life cycle: a survey and open challenges

J Koo, G Kang, YG Kim - Sustainability, 2020 - mdpi.com
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks

N Hu, Z Tian, H Lu, X Du, M Guizani - International Journal of Machine …, 2021 - Springer
The 5G network provides higher bandwidth and lower latency for edge IoT devices to access
the core business network. But at the same time, it also expands the attack surface of the …

Traceable monero: Anonymous cryptocurrency with enhanced accountability

Y Li, G Yang, W Susilo, Y Yu, MH Au… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Monero provides a high level of anonymity for both users and their transactions. However,
many criminal activities might be committed with the protection of anonymity in …

An energy-efficient in-network computing paradigm for 6G

N Hu, Z Tian, X Du, M Guizani - IEEE Transactions on Green …, 2021 - ieeexplore.ieee.org
In the 6G network era, energy-efficient computing means higher resource utilization and
lower energy consumption. The traditional computing model regards the network as a …

Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health

H Wang, J Liang, Y Ding, S Tang, Y Wang - Computer Standards & …, 2023 - Elsevier
Smart Health, with its flexibility and efficiency, has been widely deployed, especially during
the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not …

Honeypot identification in softwarized industrial cyber–physical systems

Y Sun, Z Tian, M Li, S Su, X Du… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In softwarized industrial networking, honeypot identification is very important for both the
attacker and the defender. Existing honeypot identification relies on simple features of …

Deep-green: a dispersed energy-efficiency computing paradigm for green industrial IoT

N Hu, Z Tian, X Du, N Guizani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The rapid development of the Industrial Internet of Things (IIoT) has led to the explosive
growth of industrial control data. Cloud computing-based industrial control models cause …

Contract and Lyapunov optimization-based load scheduling and energy management for UAV charging stations

L Lv, C Zheng, L Zhang, C Shan, Z Tian… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly
being used in many of our daily applications. However, there are many kinds of UAVs that …