최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Sensors, v.18 no.8, 2018년, pp.2659 -
Zhang, Yinghui (National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China) , Zhao, Jiangfan (zjf291495791@163.com (J.Z.)) , Zheng, Dong (dkx523121943@163.com (K.D.)) , Deng, Kaixin (rfyren@163.com (F.R.)) , Ren, Fangyuan (National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China) , Zheng, Xiaokun (zjf291495791@163.com (J.Z.)) , Shu, Jiangang (dkx523121943@163.com (K.D.))
As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog node...
1. Wang Q. Wang C. Ren K. Lou W. Li J. Enabling public auditability and data dynamics for storage security in cloud computing IEEE Trans. Parallel Distrib. Syst. 2011 22 847 859 10.1109/TPDS.2010.183
2. Armbrust M. Fox A. Griffith R. Joseph A.D. Katz R. Konwinski A. Lee G. Patterson D. Rabkin A. Stoica I. A view of cloud computing Commun. ACM 2010 53 50 58 10.1145/1721654.1721672
3. Zhang Y. Zheng D. Li Q. Li J. Li H. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing Secur. Commun. Netw. 2016 9 3688 3702 10.1002/sec.1574
4. Yang L. Han Z. Huang Z. Ma J. A remotely keyed file encryption scheme under mobile cloud computing J. Netw. Comput. Appl. 2018 106 90 99 10.1016/j.jnca.2017.12.017
5. Li J. Zhang Y. Chen X. Xiang Y. Secure attribute-based data sharing for resource-limited users in cloud computing Comput. Secur. 2018 72 1 12 10.1016/j.cose.2017.08.007
6. Zhang Y. Yang M. Zheng D. Lang P. Wu A. Chen C. Efficient and secure big data storage system with leakage resilience in cloud computing Soft Comput. 2018 10.1007/s00500-018-3435-z
7. Hosseinian-Far A. Ramachandran M. Slack C.L. Emerging Trends in Cloud Computing, Big Data, Fog Computing, IoT and Smart Living Springer Cham, Switzerland 2018 29 40
8. Stergiou C. Psannis K.E. Kim B.G. Gupta B. Secure integration of IoT and cloud computing Future Gener. Comput. Syst. 2018 78 964 975 10.1016/j.future.2016.11.031
9. Zhang Y. Zheng D. Guo R. Zhao Q. Fine-grained access control systems suitable for resource-constrained users in cloud computing Comput. Inf. 2018 37 327 348 10.4149/cai_2018_2_327
10. Lu R. Heung K. Lashkari A.H. Ghorbani A.A. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT IEEE Access 2017 5 3302 3312 10.1109/ACCESS.2017.2677520
11. Yannuzzi M. Milito R. Serral-Gracià R. Montero D. Nemirovsky M. Key ingredients in an IoT recipe: Fog computing, cloud computing, and more fog computing Proceedings of the IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) Athens, Greece 1–3 December 2014 325 329
13. Shen J. Wang C. Li T. Chen X. Huang X. Zhan Z.H. Secure data uploading scheme for a smart home system Inf. Sci. 2018 453 186 197 10.1016/j.ins.2018.04.048
14. Zhang Y. Zheng D. Deng R.H. Security and privacy in smart health: Efficient policy-hiding attribute-based access control IEEE Internet Things J. 2018 5 2130 2145 10.1109/JIOT.2018.2825289
15. Shen J. Gui Z. Ji S. Shen J. Tan H. Tang Y. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks J. Netw. Comput. Appl. 2018 106 117 123 10.1016/j.jnca.2018.01.003
16. Zhang Y. Chen X. Li J. Li H. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks Comput. Netw. 2014 75 192 211 10.1016/j.comnet.2014.10.009
17. Han Q. Zhang Y. Chen X. Li H. Quan J. Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks Springer Berlin/Heidelberg, Germany 2012 180 191
18. Zhang Y. Chen X. Li H. Cao J. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks Secur. Commun. Netw. 2012 5 1121 1130 10.1002/sec.421
19. Wang C. Shen J. Liu Q. Ren Y. Li T. A novel security scheme based on instant encrypted transmission for Internet of Things Secur. Commun. Netw. 2018 2018 3680851 10.1155/2018/3680851
20. Jhaveri R.H. Patel N.M. Zhong Y. Sangaiah A.K. Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT IEEE Access 2018 6 20085 20103 10.1109/ACCESS.2018.2822945
21. Zhang Y. Li J. Chen X. Li H. Anonymous attribute-based proxy re-encryption for access control in cloud computing Secur. Commun. Netw. 2016 9 2397 2411 10.1002/sec.1509
22. Bhuiyan M.Z.A. Wu J. Wang G. Cao J. Sensing and decision making in cyber-Physical systems: The case of structural event monitoring IEEE Trans. Ind. Inf. 2016 12 2103 2114 10.1109/TII.2016.2518642
23. Shu J. Jia X. Yang K. Wang H. Privacy-preserving task recommendation services for crowdsourcing IEEE Trans. Serv. Comput. 2018 10.1109/TSC.2018.2791601
24. Shu J. Liu X. Jia X. Yang K. Deng R.H. Anonymous privacy-preserving task matching in crowdsourcing IEEE Internet Things J. 2018 5 3068 3078 10.1109/JIOT.2018.2830784
25. He D. Kumar N. Zeadally S. Vinel A. Yang L.T. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries IEEE Trans. Smart Grid 2017 8 2411 2419 10.1109/TSG.2017.2720159
26. Zhang Y. Zhao J. Zheng D. Efficient and privacy-aware power injection over AMI and smart grid slice in future 5G networks Mob. Inf. Syst. 2017 2017 3680671 10.1155/2017/3680671
27. Zhang Y. Li J. Zheng D. Li P. Tian Y. Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice J. Netw. Comput. Appl. 2018 10.1016/j.jnca.2018.07.017
28. Jia W. Zhu H. Cao Z. Dong X. Xiao C. Human-factor-aware privacy-preserving aggregation in smart grid IEEE Syst. J. 2014 8 598 607 10.1109/JSYST.2013.2260937
29. Stojmenovic I. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks Proceedings of the Australasian Telecommunication Networks and Applications Conference (ATNAC) Southbank, VIC, Australia 26–28 November 2014 117 122
30. Mahmoud M. Saputro N. Akula P. Akkaya K. Privacy-preserving power injection over a hybrid AMI/LTE smart grid network IEEE Internet Things J. 2016 4 870 880 10.1109/JIOT.2016.2593453
31. Mukherjee M. Matam R. Shu L. Maglaras L. Ferrag M.A. Choudhury N. Kumar V. Security and privacy in fog computing: challenges IEEE Access 2017 5 19293 19304 10.1109/ACCESS.2017.2749422
32. Zhang Y. Chen X. Li J. Wong D.S. Li H. You I. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Inf. Sci. 2017 379 42 61 10.1016/j.ins.2016.04.015
33. Zhang Y. Wu A. Zheng D. Efficient and privacy-aware attribute-based data sharing in mobile cloud computing J. Ambient Intell. Hum. Comput. 2018 9 1039 1048 10.1007/s12652-017-0509-1
34. Paillier P. Public-key cryptosystems based on composite degree residuosity classes Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic 2–6 May 1999 223 238
35. Xu J. Wei L. Zhang Y. Wang A. Zhou F. Gao C.Z. Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures J. Netw. Comput. Appl. 2018 107 113 124 10.1016/j.jnca.2018.01.014
36. Gao C.z. Cheng Q. He P. Susilo W. Li J. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack Inf. Sci. 2018 444 72 88 10.1016/j.ins.2018.02.058
37. Shen H. Zhang M.W. A Privacy-preserving multilevel users’ electricity consumption aggregation and control scheme in smart grids J. Cryptol. Res. 2016 3 171 191
38. Zhang Y. Shu J. Liu X. Li J. Zheng D. Security analysis of a large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing IEEE Internet Things J. 2018 10.1109/JIOT.2018.2862381
39. Lai X. Zou W. Xie D. Li X. Fan L. DF relaying networks with randomly distributed interferers IEEE Access 2017 5 18909 18917 10.1109/ACCESS.2017.2751105
40. Zhang Y. Lang P. Zheng D. Yang M. Guo R. A secure and privacy-aware smart health system with secret key leakage resilience Secur. Commun. Netw. 2018 2018 7202598 10.1155/2018/7202598
41. Fan L. Lei X. Yang N. Duong T.Q. Karagiannidis G.K. Secrecy cooperative networks with outdated relay selection over correlated fading channels IEEE Trans. Veh. Technol. 2017 66 7599 7603 10.1109/TVT.2017.2669240
42. Fan L. Lei X. Yang N. Duong T.Q. Karagiannidis G.K. Secure multiple amplify-and-forward relaying with cochannel interference IEEE J. Sel. Top. Signal Process. 2016 10 1494 1505 10.1109/JSTSP.2016.2607692
43. Tan W. Xie D. Xia J. Tan W. Fan L. Jin S. Spectral and energy efficiency of massive MIMO for hybrid architectures based on phase shifters IEEE Access 2018 6 11751 11759 10.1109/ACCESS.2018.2796571
44. Bhuiyan M.Z.A. Wu J. Wang G. Chen Z. Chen J. Wang T. Quality-guaranteed event-sensitive data collection and monitoring in vibration sensor networks IEEE Trans. Ind. Inf. 2017 13 572 583 10.1109/TII.2017.2665463
45. Gershenfeld N. Krikorian R. Cohen D. The Internet of Things Sci. Am. 2004 291 76 81 10.1038/scientificamerican1004-76 15487673
46. Zhou H. Chen J. Zhang Y.Y. Dang L.J. A multidimensional data aggregation scheme in multilevel network in smart grid J. Cryptol. Res. 2017 4 114 132
47. Zhang Y. Deng R.H. Liu X. Zheng D. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing Inf. Sci. 2018 462 262 277 10.1016/j.ins.2018.06.018
48. Zhang Y. Deng R.H. Shu J. Yang K. Zheng D. TKSE: trustworthy keyword search over encrypted data with two-side verifiability via blockchain IEEE Access 2018 6 31077 31087 10.1109/ACCESS.2018.2844400
49. Zhang Y. Deng R.H. Liu X. Zheng D. Outsourcing service fair payment based on blockchain and its application in cloud computing IEEE Trans. Serv. Comput. 2018 10.1109/TSC.2018.2864191
50. Chen X. Li J. Weng J. Ma J. Lou W. Verifiable computation over large database with incremental updates IEEE Trans. Comput. 2016 65 3184 3195 10.1109/TC.2015.2512870
51. Chen W. Lei H. Qi K. Lattice-based linearly homomorphic signatures in the standard model Theor. Comput. Sci. 2016 634 47 54 10.1016/j.tcs.2016.04.009
52. Lin Q. Yan H. Huang Z. Chen W. Shen J. Tang Y. An ID-based linearly homomorphic signature scheme and its application in blockchain IEEE Access 2018 6 20632 20640 10.1109/ACCESS.2018.2809426
53. Chen X. Li J. Huang X. Ma J. Lou W. New publicly verifiable databases with efficient updates IEEE Trans. Dependable Secure Comput. 2015 12 546 556 10.1109/TDSC.2014.2366471
※ AI-Helper는 부적절한 답변을 할 수 있습니다.