Journal ArticleDOI
Intelligent cryptography approach for secure distributed big data storage in cloud computing
Reads0
Chats0
TLDR
An intelligent cryptography approach, by which the cloud service operators cannot directly reach partial data is proposed, and experimental results depict that the approach can effectively defend main threats from clouds and requires with an acceptable computation time.About:
This article is published in Information Sciences.The article was published on 2017-05-01. It has received 196 citations till now. The article focuses on the topics: Cloud computing security & Cloud computing.read more
Citations
More filters
Journal ArticleDOI
A survey on FinTech
TL;DR: This work aims to produce a survey of FinTech by collecting and reviewing contemporary achievements, by which a theoretical data-driven FinTech framework is proposed and five technical aspects are summarized and involved.
Journal Article
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute–Based Encryption
TL;DR: A cloud-based PHR system taking a radically new architectural solution to health record portability and a prototype of My PHR Machines applied to two use cases, i.e., radiology image sharing and personalized medicine are discussed.
Journal ArticleDOI
Multimedia big data computing and Internet of Things applications: A taxonomy and process model
Aparna Kumari,Sudeep Tanwar,Sudhanshu Tyagi,Neeraj Kumar,Michele Maasberg,Kim-Kwang Raymond Choo +5 more
TL;DR: This process model addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (QoS) requirements.
Journal ArticleDOI
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
Jie Yuan,Xiaoyong Li +1 more
TL;DR: A reliable and lightweight trust mechanism is originally proposed for IoT edge devices based on multi-source feedback information fusion based on objective information entropy theory, which can overcome the limitations of traditional trust schemes.
Journal ArticleDOI
Privacy-preserving wireless communications using bipartite matching in social big data
TL;DR: This paper proposes a novel algorithm using communication management techniques for enhancing the security of the systems and supporting applications with real-time constraints that can reduce the security cost by up to 32.62% and 23.37% on average, respectively, compare to the traditional methods.
References
More filters
Journal ArticleDOI
Data-intensive applications, challenges, techniques and technologies: A survey on Big Data
TL;DR: This paper is aimed to demonstrate a close-up view about Big Data, including Big Data applications, Big Data opportunities and challenges, as well as the state-of-the-art techniques and technologies currently adopt to deal with the Big Data problems.
Proceedings ArticleDOI
Leveled) fully homomorphic encryption without bootstrapping
TL;DR: A novel approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions, using some new techniques recently introduced by Brakerski and Vaikuntanathan (FOCS 2011).
Journal ArticleDOI
Improved proxy re-encryption schemes with applications to secure distributed storage
TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Journal ArticleDOI
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
TL;DR: A novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers are proposed and a high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE.
Journal ArticleDOI
A survey on trust management for Internet of Things
TL;DR: This paper investigates the properties of trust, proposes objectives of IoT trust management, and provides a survey on the current literature advances towards trustworthy IoT to propose a research model for holistic trust management in IoT.