Efficient and Secure Data Storage for Future Networks: Review and Future Opportunities

AS Alsalim, MA Javed - IEEE Access, 2024 - ieeexplore.ieee.org
With the increase in the number of Internet of Things (IoT) applications, the reliance on
robust networking, reliable communications, and efficient and secure data storage is …

Service recommendation in JointCloud environments: An efficient regret theory-based Qos-aware approach

J Shi, R Rao, Y Song, X Wang, B Yi, Q He, C Zeng… - Computer Networks, 2024 - Elsevier
With the proliferation of data-intensive applications, there arises an urgent demand for a
substantial amount of cloud services to meet their requirements for data analysis. This …

A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain

CN Yang, P Li, HH Cheng, HC Kuo… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Secret sharing (SS) is a threshold technology that shares a secret value by generating and
distributing shares in the way that a set of any shares can recover the secret. On the other …

JointCloud Resource Market Competition: A Game-Theoretic Approach

J Shi, B Yi, X Wang, M Huang, Y Song… - IEEE/ACM …, 2024 - ieeexplore.ieee.org
The current global economy is undergoing a transformative phase, emphasizing
collaboration among multiple competing entities rather than monopolization. Economic …

An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage

S Feng, LF Zhang - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
In single-cloud storage, ciphertext-policy attribute-based encryption (CP-ABE) allows one to
encrypt any data under an access structure to a cloud server, specifying what attributes are …

Integrating Large Language Models with Internet of Things Applications

M Zong, A Hekmati, M Guastalla, Y Li… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper identifies and analyzes applications in which Large Language Models (LLMs)
can make Internet of Things (IoT) networks more intelligent and responsive through three …

SecureNet: A Convergence of ML, Blockchain and Federated Learning for IoT Protection

A Malik, MZ Hussain, M Mustafa, B Sattar… - UCP Journal of …, 2024 - jbr.ucp.edu.pk
Abstract The Internet of Things (IoT) has become a foundational element of the digital
infrastructure, extending its connectivity across various sectors and embedding intelligence …

Access Structure Hiding Verifiable Tensor Designs

A Roy, BK Roy, K Sakurai, S Talnikar - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The field of verifiable secret sharing schemes was introduced by Verheul et al. and has
evolved over time, including well-known examples by Feldman and Pedersen. Stinson …

An Unconditionally Secure Encryption Protocol for Cloud Storage

M Moltafet, HR Sadjadpour… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
We provide an encryption protocol for storing highly confidential data of a user on a public
cloud storage. We show that the protocol provides unconditional security. More specifically …

A Note on``Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain''

Z Cao, L Liu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We show that the data storage scheme [IEEE/ACM Trans. Netw., 2023, 31 (4), 1550-1565] is
flawed due to the false secret sharing protocol, which requires that some random $4\times …