A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology
2019
IEEE Access
Big data is generated from many facilities and sensor networks in smart cities and often streamed and stored in the cloud storage platform. ...
the need for a centralized TPA in auditing schemes. ...
It is essential for a big data auditing scheme in the smart city context to support dynamic data. ...
doi:10.1109/access.2018.2888940
fatcat:3udes6tewjhn7lzvrirojrw5km
Development of Solar-Powered of Sensors Based Smart Waste Monitoring System
2021
Turkish Journal of Computer and Mathematics Education
Littering is a major crime in some countries, and public waste bins are also the only way to dispose of small waste. ...
They are also used for the collection of waste in houses, workplaces, highways, parks, etc. ...
Conclusions The proposal suggested an established pooled data ownership in cloud storage for a lightweight and secure audit process. ...
doi:10.17762/turcomat.v12i5.1056
fatcat:kmr2wmsmlbdurkwvf63gfyrjea
Data Security and Privacy Protection for Cloud Storage: A Survey
2020
IEEE Access
Thirdly, data encryption technologies and protection methods are summarized. Finally, we discuss several open research topics of data security for cloud storage. ...
In this paper, we make a comprehensive review of the literatures on data security and privacy issues, data encryption technology, and applicable countermeasures in cloud storage system. ...
This scheme implements remote data integrity auditing for cloud-based smart grid data management systems. ...
doi:10.1109/access.2020.3009876
fatcat:6kcb3junlzhvvcq3qhztumpdqq
A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges
2021
Electronics
Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the ...
To address these, there has been much work done in this domain, whereas research work considering the growing constrained applications provided by the Internet of Things (IoT) and smart city networks are ...
Although the scheme is introduced for smart healthcare I smart cities, it can be practically implemented in other infrastructures of smart cities. ...
doi:10.3390/electronics10151811
fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe
Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges
[article]
2019
arXiv
pre-print
In this context, blockchain provides innovative solutions to address challenges in Cloud of Things in terms of decentralization, data privacy and network security, while Cloud of Things offer elasticity ...
Blockchain with its decentralized, transparent and secure nature has emerged as a disruptive technology for the next generation of numerous industrial applications. ...
Smart city [117] Data auditing -A decentralized data auditing framework on cloud for smart cities. Smart contract design, experiment on security evaluation have not been done. ...
arXiv:1908.09058v1
fatcat:ik4s66nxifhthgm3gj3rrbgbey
DEVELOPMENT OF SMART CITIES IN TAIWAN FROM THE PERSPECTIVE OF CLOUD COMPUTING SECURITY
2019
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
This paper first introduces the concept of cloud computing, smart city construction in Taiwan, and the information security management standard of cloud computing, then describes the cloud computing security ...
From the concept of cloud computing, people and objects in cities are organized based on their application needs and computed in real time. ...
ACKNOWLEDGMENT We hereby would like to express my gratitude to Azion Group (Taiwan) for its support in providing source materials and financial support during the composition of this paper. ...
doi:10.5194/isprs-archives-xlii-4-w16-667-2019
fatcat:ohggwgfeknei7edbxmoqvdf4ke
Data Integrity on the Cloud Computing using Algebraic Signature
2022
International Journal for Research in Applied Science and Engineering Technology
It is based on data integrity method for providing good data security on the cloud for large organization also. ...
The popular data security method which is called cryptography taking more time and space to encrypt and decrypt for data auditing processes. ...
Data Security and Privacy Production for Cloud Storage: A Survey The new development trends called Internet of Things, digital Smart city, enterprises business digital transformation and world's digital ...
doi:10.22214/ijraset.2022.46518
fatcat:wytrbt2r7bc6fanzupfbwa2v4e
VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks
2022
Sensors
The cloud storage has been a timely service that provides a vast range of data storage for IoV networks. ...
In this paper, we propose VBlock, a blockchain-based system that addresses the issues of illegal modification of outsourced vehicular data for smart city management and improvement. ...
Ensuring data security of IoV data for safety and efficient management of the smart city is very crucial. ...
doi:10.3390/s22208083
fatcat:533yt2kbafbunjpv4hh5n7cjba
Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain
2022
Computer systems science and engineering
As a result, each behavior for data integrity checking in our scheme can be traced and audited which improves the security of the scheme greatly. ...
To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be outsourced to cloud server ...
Next, we will focus on upgrading the scheme to support data dynamic which is another attractive feature for secure cloud storage. ...
doi:10.32604/csse.2022.022317
fatcat:o6zfe5vsezckfjsloi2r7z2vxm
Applications of Blockchain in Ensuring the Security and Privacy of Electronic Health Record Systems: A Survey
2020
Computers & security
Therefore, in this paper we perform a systematic literature review of blockchain approaches designed for EHR systems, focusing only on the security and privacy aspects. ...
Due to the popularity of blockchain, there have been many proposed applications of blockchain in the healthcare sector, such as electronic health record (EHR) systems. ...
Acknowledgements We thank the anonymous reviewers for their valuable comments and suggestions which helped us to improve the content and presentation of this paper. ...
doi:10.1016/j.cose.2020.101966
pmid:32834254
pmcid:PMC7362828
fatcat:ymwetk2kajhddm4wu2p6lagqzm
Blockchain Based Data Integrity Verification for Large-Scale IoT Data
2019
IEEE Access
Achieving data integrity verification for large-scale IoT data in cloud storage safely and efficiently has become one of the hot topics with further applications of Internet of Things. ...
Traditional data integrity verification methods generally use encryption techniques to protect data in the cloud, relying on trusted Third Party Auditors (TPAs). ...
home, smart city, etc ...
doi:10.1109/access.2019.2952635
fatcat:kfbrdprta5hyviizi3oe26x3kq
Security and Confidentiality of the Data using Block Level in Health Care System
2019
International journal of recent technology and engineering
However, data security and user privacy are a major concern for smart healthcare systems. These days any kind of data can be used for malicious purposes. ...
Nowadays rapid development of cloud computing in smart healthcare system has significantly improved the quality of health. ...
This technique provides an identity-based data integrity auditing scheme for secure cloud storage. ...
doi:10.35940/ijrte.b2656.078219
fatcat:s4br5rtzkzdxbfbyhmhpydcyuu
Internet of Cloud: Security and Privacy issues
[article]
2017
arXiv
pre-print
IoT adopting Cloud services has brought new security challenges. ...
In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. ...
checking for secure cloud storage. ...
arXiv:1711.00525v1
fatcat:jlwxjo6jrnbzfjpelriqv6oa5m
An Improved Secure Public Cloud Auditing Scheme in Edge Computing
2022
Security and Communication Networks
Recently, a cloud auditing scheme which can be used to smart cities has been proposed, which is lightweight and privacy-preserving. ...
Cloud storage plays an important role in the data processing of edge computing. It is very necessary to protect the integrity of these data and the privacy of users. ...
In the future, cloud storage auditing schemes will be proposed to adapt to more different situations in edge computing, but we should give more attention to the security of the schemes. ...
doi:10.1155/2022/1557233
fatcat:24y5g46pbrf4hcxasvj2ho7ijy
SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network
2022
Future Internet
However, the massive amount of point cloud data aggregated from distributed 3D sensors also poses challenges for secure data collection, management, storage, and sharing. ...
Leveraging smart contracts for digitizing access control policies and point cloud data on the Blockchain, data owners have full control of their 3D sensors and point clouds. ...
Data Availability Statement: Not applicable. ...
doi:10.3390/fi14120354
fatcat:l65xncziyne7jg3fcwuiccsdnq
« Previous
Showing results 1 — 15 out of 3,198 results