Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4 Hits in 4.6 sec

Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE

Kittur P. Kibiwott, Fengli Zhang, Anyembe Andrew Omala, Daniel Adu-Gyamfi
2018 International Journal of Network Security  
In this paper we propose a Cloudlet-Based eHealth Big Data System with Outsourced Decryption (CBe-BDS-OD) to address the above challenges.  ...  To accommodate mobile devices with limited resources, the computation power is borrowed from the cloudlet server securely. Security analysis demonstrates that our scheme is secure.  ...  Acknowledgments This work was supported by the Sichuan Province Science Technology Project [grant numbers 2014GZ0109 and 2015JY0178].  ... 
dblp:journals/ijnsec/KibiwottZOA18 fatcat:hrftdlptnrewfoujzp2kr6ugqy

Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure

Isma Masood, Yongli Wang, Ali Daud, Naif Radi Aljohani, Hassan Dawood
2018 Wireless Communications and Mobile Computing  
the technique; (4) accessing PPPs; (5) analysing the security; and (6) estimating performance.  ...  Hence, the distributed environment of S-CI presents new threats to patient data privacy and security. In this paper, we review the techniques for patient data privacy and security in S-CI.  ...  Nanjing Science and Technology Development Plan Project (201805036).  ... 
doi:10.1155/2018/2143897 fatcat:23b3lgvnfzgshn5ipanmk46iwm

Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk

Pengshou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guoqiang Ma, Xue-Ming Han
2020 International Journal of Network Security  
Aimed at the problem of adaptive access control model of vehicular network big data environment, XACML powerful ability of expressing access strategy is used in the paper, and we conduct the risk quantification  ...  With the constant expansion of vehiclescale and the continuous development of Internet of Vehicles, the network environment of the data resource of Internet of Vehicles is becoming more and more complex  ...  The authors gratefully acknowledge the anonymous reviewers for their helpful comments and suggestions.  ... 
dblp:journals/ijnsec/XieFFYMH20 fatcat:2kipokagwzbk5p6s4cjvvfldlm

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges

Abeer Iftikhar Tahirkheli, Muhammad Shiraz, Bashir Hayat, Muhammad Idrees, Ahthasham Sajid, Rahat Ullah, Nasir Ayub, Ki-Il Kim
2021 Electronics  
Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase.  ...  In this survey, we provide a comprehensive security analysis of CC-enabled IoT and present state-of-the-art in the research area.  ...  Various techniques have been proposed to overcome this problem, like fine-grained sharing and attribute-based encryption (ABE). ABE has weak security and high computation overhead in cloud data.  ... 
doi:10.3390/electronics10151811 fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe