메뉴 건너뛰기




Volumn 55, Issue 1, 2017, Pages 26-33

Security and Privacy for Cloud-Based IoT: Challenges

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA HANDLING; DATA PRIVACY; DIGITAL STORAGE; UBIQUITOUS COMPUTING;

EID: 85009959911     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2017.1600363CM     Document Type: Article
Times cited : (537)

References (15)
  • 1
    • 84892614267 scopus 로고    scopus 로고
    • A Survey on the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities
    • Z. Sheng et al., "A Survey on the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities," IEEE Wireless Commun., vol. 20, no. 6, 2013, pp. 91-98.
    • (2013) IEEE Wireless Commun , vol.20 , Issue.6 , pp. 91-98
    • Sheng, Z.1
  • 2
    • 81355138521 scopus 로고    scopus 로고
    • Smart Community: An Internet of Things Application
    • X. Li et al., "Smart Community: An Internet of Things Application," IEEE Commun. Mag., vol. 49, no. 11, 2011, pp. 68-75.
    • (2011) IEEE Commun. Mag , vol.49 , Issue.11 , pp. 68-75
    • Li, X.1
  • 3
    • 80052854156 scopus 로고    scopus 로고
    • Securing the Internet of Things
    • R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," Computer, vol. 44, no. 9, 2011, pp. 51-58.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 4
    • 58149123333 scopus 로고    scopus 로고
    • TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving
    • X. Lin et al., "TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving," IEEE Trans. Wireless Commun., vol. 7, no. 12, 2008, pp. 4987-98.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.12 , pp. 4987-4998
    • Lin, X.1
  • 5
    • 84884387687 scopus 로고    scopus 로고
    • Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks
    • X. Lin and X. Li, "Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks," IEEE Trans. Vehic. Tech., vol. 62, no. 7, 2013, pp. 3339-48.
    • (2013) IEEE Trans. Vehic. Tech , vol.62 , Issue.7 , pp. 3339-3348
    • Lin, X.1    Li, X.2
  • 6
    • 84929268858 scopus 로고    scopus 로고
    • 4S: A Secure and Privacy-Preserving Key Management Scheme for Cloud-Assisted Wireless Body Area Network in m-Healthcare Social Networks
    • J. Zhou et al., "4S: A Secure and Privacy-Preserving Key Management Scheme for Cloud-Assisted Wireless Body Area Network in m-Healthcare Social Networks," Info. Sciences, vol. 314, 2015, pp. 255-76.
    • (2015) Info. Sciences , vol.314 , pp. 255-276
    • Zhou, J.1
  • 8
    • 79955712919 scopus 로고    scopus 로고
    • Key Management Systems for Sensor Networks in the Context of the Internet of Things
    • R. Roman et al., "Key Management Systems for Sensor Networks in the Context of the Internet of Things," Computer & Electrical Engineering, vol. 37, no. 2, 2011, pp. 147-59.
    • (2011) Computer & Electrical Engineering , vol.37 , Issue.2 , pp. 147-159
    • Roman, R.1
  • 9
    • 70350238158 scopus 로고    scopus 로고
    • SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks
    • Oct
    • H. Zhu et al., "SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks," IEEE Trans. Vehic. Tech., vol. 58, no. 8, Oct. 2009, pp. 4628-39.
    • (2009) IEEE Trans. Vehic. Tech , vol.58 , Issue.8 , pp. 4628-4639
    • Zhu, H.1
  • 10
    • 84928956436 scopus 로고    scopus 로고
    • Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs
    • J. Zhou et al., "Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs," IEEE Trans. Info. Forensics and Security, vol. 10, no. 6, 2015 , pp. 1299-314.
    • (2015) IEEE Trans. Info. Forensics and Security , vol.10 , Issue.6 , pp. 1299-1314
    • Zhou, J.1
  • 11
    • 0000277371 scopus 로고    scopus 로고
    • Public Key Cryptosystems Based on Composite Degree Residuosity Classes
    • P. Paillier, "Public Key Cryptosystems Based on Composite Degree Residuosity Classes," Eurocrypt '99, pp. 223-38.
    • Eurocrypt , vol.99 , pp. 223-238
    • Paillier, P.1
  • 12
    • 84959340545 scopus 로고    scopus 로고
    • Resource Management in Mobile Sink Based Wireless Sensor Networks through Cloud Computing
    • Springer-Verlag
    • Y. Saleem, F. Salim, and M. H. Rehmani, "Resource Management in Mobile Sink Based Wireless Sensor Networks through Cloud Computing," in Resource Management in Mobile Computing Environments, Springer-Verlag, vol. 3, 2014, pp. 439-59.
    • (2014) Resource Management in Mobile Computing Environments , vol.3 , pp. 439-459
    • Saleem, Y.1    Salim, F.2    Rehmani, M.H.3
  • 13
    • 77951292577 scopus 로고    scopus 로고
    • Pi: A Practical Incentive Protocol for Delay Tolerant Networks
    • Apr
    • R. Lu et al., "Pi: A Practical Incentive Protocol for Delay Tolerant Networks," IEEE Trans. Wireless Commun., vol. 9, no. 4, Apr. 2010, pp. 1483-92.
    • (2010) IEEE Trans. Wireless Commun , vol.9 , Issue.4 , pp. 1483-1492
    • Lu, R.1
  • 15
    • 44449140946 scopus 로고    scopus 로고
    • Efficient Noninteractive Proof Systems for Bilinear Groups
    • Springer Berlin
    • J. Groth and A. Sahiai, "Efficient Noninteractive Proof Systems for Bilinear Groups," Advances in Cryptology®EUROCRYPT 2008, Springer Berlin, 2008., pp. 415-32
    • (2008) Advances in Cryptology®EUROCRYPT 2008 , pp. 415-432
    • Groth, J.1    Sahiai, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.