J Hu, AV Vasilakos - IEEE Transactions on Smart Grid, 2016 - ieeexplore.ieee.org
The limited available fossil fuels and the call for sustainable environment have brought about new technologies for the high efficiency in the use of fossil fuels and introduction of …
T Li, H Wang, D He, J Yu - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) devices possessed by individuals produce massive amounts of data. The private data onto specific IoT devices can be combined with intelligent platform to …
A Jeyachandran, M Poongodi - Int. J. Pure Appl. Math, 2018 - researchgate.net
Security in cloud computing is an area that needsmaximum concentration. In this paper, we are going to use Bastion Algorithm that will be used to encrypt and decrypt the le and later …
H Zhong, W Zhu, Y Xu, J Cui - Soft Computing, 2018 - Springer
For realizing the flexible, scalable and fuzzy fine-grained access control, ciphertext policy attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage …
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant momentum in connecting physical objects to the Internet and facilitating machine-to-human …
JK Liu, MH Au, X Huang, R Lu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we introduce a new fine-grained two-factor authentication (2FA) access control system for web-based cloud computing services. Specifically, in our proposed 2FA access …
U Narayanan, V Paul, S Joseph - … of King Saud University-Computer and …, 2022 - Elsevier
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different issues have ascended in the area of Big data security such as infrastructure security, data …
Abstract The Internet of Things (IoT) is the next generation plethora of interconnected devices that includes sensors, actuators, etc. and that can provide personalized services …