A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE
2018
International Journal of Network Security
In this paper we propose a Cloudlet-Based eHealth Big Data System with Outsourced Decryption (CBe-BDS-OD) to address the above challenges. ...
To accommodate mobile devices with limited resources, the computation power is borrowed from the cloudlet server securely. Security analysis demonstrates that our scheme is secure. ...
Acknowledgments This work was supported by the Sichuan Province Science Technology Project [grant numbers 2014GZ0109 and 2015JY0178]. ...
dblp:journals/ijnsec/KibiwottZOA18
fatcat:hrftdlptnrewfoujzp2kr6ugqy
Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure
2018
Wireless Communications and Mobile Computing
the technique; (4) accessing PPPs; (5) analysing the security; and (6) estimating performance. ...
Hence, the distributed environment of S-CI presents new threats to patient data privacy and security. In this paper, we review the techniques for patient data privacy and security in S-CI. ...
Nanjing Science and Technology Development Plan Project (201805036). ...
doi:10.1155/2018/2143897
fatcat:23b3lgvnfzgshn5ipanmk46iwm
Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
2020
International Journal of Network Security
Aimed at the problem of adaptive access control model of vehicular network big data environment, XACML powerful ability of expressing access strategy is used in the paper, and we conduct the risk quantification ...
With the constant expansion of vehiclescale and the continuous development of Internet of Vehicles, the network environment of the data resource of Internet of Vehicles is becoming more and more complex ...
The authors gratefully acknowledge the anonymous reviewers for their helpful comments and suggestions. ...
dblp:journals/ijnsec/XieFFYMH20
fatcat:2kipokagwzbk5p6s4cjvvfldlm
A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges
2021
Electronics
Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase. ...
In this survey, we provide a comprehensive security analysis of CC-enabled IoT and present state-of-the-art in the research area. ...
Various techniques have been proposed to overcome this problem, like fine-grained sharing and attribute-based encryption (ABE). ABE has weak security and high computation overhead in cloud data. ...
doi:10.3390/electronics10151811
fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe