Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Energy big data analytics and security: challenges and opportunities

J Hu, AV Vasilakos - IEEE Transactions on Smart Grid, 2016 - ieeexplore.ieee.org
The limited available fossil fuels and the call for sustainable environment have brought
about new technologies for the high efficiency in the use of fossil fuels and introduction of …

Blockchain-based privacy-preserving and rewarding private data sharing for IoT

T Li, H Wang, D He, J Yu - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) devices possessed by individuals produce massive amounts of
data. The private data onto specific IoT devices can be combined with intelligent platform to …

[PDF][PDF] 面向能源互联网数字孪生的电力物联网关键技术及展望

赵鹏, 蒲天骄, 王新迎, 韩笑 - 中国电机工程学报, 2022 - csee.org.cn
随着“碳达峰, 碳中和” 目标与以新能源为主体的新型电力系统的提出, 能源技术与数字技术
进一步深度融合, 电网加速向能源互联网演进. 构建能源互联网及其数字孪生系统对电力物联网 …

[PDF][PDF] Securing Cloud information with the use of Bastion Algorithm to enhance Confidentiality and Protection

A Jeyachandran, M Poongodi - Int. J. Pure Appl. Math, 2018 - researchgate.net
Security in cloud computing is an area that needsmaximum concentration. In this paper, we
are going to use Bastion Algorithm that will be used to encrypt and decrypt the le and later …

Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage

H Zhong, W Zhu, Y Xu, J Cui - Soft Computing, 2018 - Springer
For realizing the flexible, scalable and fuzzy fine-grained access control, ciphertext policy
attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Fine-grained two-factor access control for web-based cloud computing services

JK Liu, MH Au, X Huang, R Lu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we introduce a new fine-grained two-factor authentication (2FA) access control
system for web-based cloud computing services. Specifically, in our proposed 2FA access …

[HTML][HTML] A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

U Narayanan, V Paul, S Joseph - … of King Saud University-Computer and …, 2022 - Elsevier
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different
issues have ascended in the area of Big data security such as infrastructure security, data …

A lightweight machine learning-based authentication framework for smart IoT devices

P Punithavathi, S Geetha, M Karuppiah, SKH Islam… - Information …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is the next generation plethora of interconnected
devices that includes sensors, actuators, etc. and that can provide personalized services …