An overview of security and privacy in smart cities' IoT communications

F Al‐Turjman, H Zahmatkesh… - Transactions on …, 2022 - Wiley Online Library
Smart cities have brought significant improvements in quality of life and services to citizens
and urban environments. They are fully enabled to control the physical objects in real time …

Centralized, distributed, and everything in between: Reviewing access control solutions for the IoT

S Dramé-Maigné, M Laurent, L Castillo… - ACM Computing Surveys …, 2021 - dl.acm.org
The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT
devices is often being overlooked. Among the vast array of security issues plaguing the …

[HTML][HTML] Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing

S Athanere, R Thakur - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, cloud servers are gathering an increasing amount of data. Data is commonly
stored on cloud servers in the form of ciphertext to protect security and concealment of data …

A Critical Investigation and Analysis of Strategic Techniques Before Approving Cloud Computing Service Frameworks

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Cloud computing is becoming increasingly fashionable in distributed computing
environment. Processing and Data storage use cloud environment is becoming a movement …

A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing

X Qin, Y Huang, Z Yang, X Li - Journal of Systems Architecture, 2021 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) has been widely studied and used in
access control schemes for secure data sharing. Since in most of the existing attribute-based …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

A novel zero-trust network access control scheme based on the security profile of devices and users

P García-Teodoro, J Camacho, G Maciá-Fernández… - Computer Networks, 2022 - Elsevier
Security constitutes a principal concern for communication networks and services at present.
This way, threats should be under control to minimize risks over time in real environments …

Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography

S Atiewi, A Al-Rahayfeh, M Almiani, S Yussof… - IEEE …, 2020 - ieeexplore.ieee.org
Organizations share an evolving interest in adopting a cloud computing approach for
Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology …

Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities

A Kumar, SB Khan, SK Pandey, A Shankar… - Journal of Cloud …, 2023 - Springer
Cloud computing is the most recent smart city advancement, made possible by the
increasing volume of heterogeneous data produced by apps. More storage capacity and …

Dhacs: Smart contract-based decentralized hybrid access control for industrial internet-of-things

R Saha, G Kumar, M Conti, T Devgun… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The integration between blockchains, Internet-of-Thing (IoT), and smart contracts is an
emerging and promising technology. The advantages of this technology have raised the …