메뉴 건너뛰기




Volumn 5-9-December-2016, Issue , 2016, Pages 30-39

A multi-cloud based privacy-preserving data publishing scheme for the internet of things

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INTERNET OF THINGS; SECURITY OF DATA; SECURITY SYSTEMS; UBIQUITOUS COMPUTING; WINDOWS OPERATING SYSTEM;

EID: 85007524464     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2991079.2991127     Document Type: Conference Paper
Times cited : (31)

References (29)
  • 1
    • 85082212722 scopus 로고    scopus 로고
    • Java Pairing-Based Cryptography Library.
    • Java Pairing-Based Cryptography Library. http://gas.dia.unisa.it/projects/jpbc/.
  • 2
    • 85082219852 scopus 로고    scopus 로고
    • Raspberry Pi.
    • Raspberry Pi. https://www.raspberrypi.org/.
  • 3
    • 85082213324 scopus 로고    scopus 로고
    • The 10 most popular Internet of Things applications.
    • The 10 most popular Internet of Things applications. http://iot-analytics.com/10-internet-of-things-applications/.
  • 5
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7): 422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 6
    • 39049153474 scopus 로고    scopus 로고
    • Using attribute-based access control to enable attribute-based messaging
    • R. Bobba, O. Fatemieh, F. Khan, C. A. Gunter, and H. Khurana. Using attribute-based access control to enable attribute-based messaging. In ACSAC, 2006.
    • (2006) ACSAC
    • Bobba, R.1    Fatemieh, O.2    Khan, F.3    Gunter, C.A.4    Khurana, H.5
  • 7
    • 33646870054 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology, 2005.
    • (2005) Advances in Cryptology
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 11
    • 79960854270 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Advances in Cryptology. 2010.
    • (2010) Advances in Cryptology
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 12
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In CCS, 2006.
    • (2006) CCS
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 17
    • 84876027843 scopus 로고    scopus 로고
    • Preserving data integrity for smart grid data aggregation
    • F. Li and B. Luo. Preserving data integrity for smart grid data aggregation. In SmartGridComm, 2012.
    • (2012) SmartGridComm
    • Li, F.1    Luo, B.2
  • 18
    • 80051631772 scopus 로고    scopus 로고
    • Secure information aggregation for smart grids using homomorphic encryption
    • IEEE
    • F. Li, B. Luo, and P. Liu. Secure information aggregation for smart grids using homomorphic encryption. In SmartGridComm. IEEE, 2010.
    • (2010) SmartGridComm
    • Li, F.1    Luo, B.2    Liu, P.3
  • 20
    • 84896819685 scopus 로고    scopus 로고
    • Detecting false data injection attacks on power grid by sparse optimization
    • L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, and Z. Han. Detecting false data injection attacks on power grid by sparse optimization. Smart Grid, IEEE Transactions on, 5(2): 612-621, 2014.
    • (2014) Smart Grid IEEE Transactions on , vol.5 , Issue.2 , pp. 612-621
    • Liu, L.1    Esmalifalak, M.2    Ding, Q.3    Emesih, V.A.4    Han, Z.5
  • 22
    • 84873848479 scopus 로고    scopus 로고
    • Spoc: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency
    • R. Lu, X. Lin, and X. Shen. Spoc: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. Parallel and Distributed Systems, IEEE Transactions on, 2013.
    • (2013) Parallel and Distributed Systems IEEE Transactions on
    • Lu, R.1    Lin, X.2    Shen, X.3
  • 25
    • 77649151691 scopus 로고    scopus 로고
    • Monitoring patients via a secure and mobile healthcare system
    • IEEE
    • Y. Ren, R. W. N. Pazzi, and A. Boukerche. Monitoring patients via a secure and mobile healthcare system. Wireless Communications, IEEE, 2010.
    • (2010) Wireless Communications
    • Ren, Y.1    Pazzi, R.W.N.2    Boukerche, A.3
  • 26
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11): 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 28
    • 84904410658 scopus 로고    scopus 로고
    • Vabks: Verifiable attribute-based keyword search over outsourced encrypted data
    • IEEE
    • Q. Zheng, S. Xu, and G. Ateniese. Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In Infocom, IEEE, 2014.
    • (2014) Infocom
    • Zheng, Q.1    Xu, S.2    Ateniese, G.3
  • 29
    • 84872074603 scopus 로고    scopus 로고
    • Efficient and secure data storage operations for mobile cloud computing
    • Z. Zhou and D. Huang. Efficient and secure data storage operations for mobile cloud computing. In Network and Service Management, 2012.
    • (2012) Network and Service Management
    • Zhou, Z.1    Huang, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.