메뉴 건너뛰기




Volumn 4, Issue 1, 2017, Pages 34-42

Secure data sharing and searching at the edge of cloud-assisted internet of things

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT EXCHANGE; INTERNET OF THINGS;

EID: 85017355402     PISSN: None     EISSN: 23256095     Source Type: Trade Journal    
DOI: 10.1109/MCC.2017.9     Document Type: Article
Times cited : (149)

References (15)
  • 2
    • 84928741396 scopus 로고    scopus 로고
    • Processing distributed internet of things data in clouds
    • L. Wang and R. Ranjan, "Processing Distributed Internet of Things Data in Clouds," IEEE Cloud Computing, vol. 2, no. 1, 2015, pp. 76-80.
    • (2015) IEEE Cloud Computing , vol.2 , Issue.1 , pp. 76-80
    • Wang, L.1    Ranjan, R.2
  • 5
    • 84969847954 scopus 로고    scopus 로고
    • Twenty security considerations for cloud-supported internet of Things
    • J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, "Twenty Security Considerations for Cloud-Supported Internet of Things," IEEE Internet of Things J., vol. 3, no. 3, 2016, pp. 269-284.
    • (2016) IEEE Internet of Things J , vol.3 , Issue.3 , pp. 269-284
    • Singh, J.1    Pasquier, T.2    Bacon, J.3    Ko, H.4    Eyers, D.5
  • 7
    • 84959540048 scopus 로고    scopus 로고
    • An efficient certificateless encryption for secure data sharing in Public Clouds
    • S.-H. Seo, M. Nabeel, X. Ding, and E. Bertino, "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds," IEEE Trans. Knowledge and Data Engineering, vol. 26, no. 9, 2014, pp. 2107-2119.
    • (2014) IEEE Trans. Knowledge and Data Engineering , vol.26 , Issue.9 , pp. 2107-2119
    • Seo, S.-H.1    Nabeel, M.2    Ding, X.3    Bertino, E.4
  • 8
    • 84973885505 scopus 로고    scopus 로고
    • Secure data analytics for cloud-integrated internet of things Applications
    • H. Kumarage, I. Khalil, A. Alabdulatif, Z. Tari, and X. Yi, "Secure Data Analytics for Cloud-Integrated Internet of Things Applications," IEEE Cloud Computing, vol. 3, no. 2, 2016, pp. 46-56.
    • (2016) IEEE Cloud Computing , vol.3 , Issue.2 , pp. 46-56
    • Kumarage, H.1    Khalil, I.2    Alabdulatif, A.3    Tari, Z.4    Yi, X.5
  • 9
    • 84929447941 scopus 로고    scopus 로고
    • TACIoT: Multidimensional trust-Aware access control system for the internet of things
    • J.B. Bernabe, J.L.H. Ramos, and A.F.S. Gomez, "TACIoT: Multidimensional Trust-Aware Access Control System for the Internet of Things," Soft Computing, vol. 20, no. 5, 2016, pp. 1763-1779.
    • (2016) Soft Computing , vol.20 , Issue.5 , pp. 1763-1779
    • Bernabe, J.B.1    Ramos, J.L.H.2    Gomez, A.F.S.3
  • 10
    • 84941881096 scopus 로고    scopus 로고
    • Robust access control framework for mobile cloud computing Network
    • F. Li, Y. Rahulamathavan, M. Conti, and M. Rajarajan, "Robust Access Control Framework for Mobile Cloud Computing Network," Computer Communications, vol. 68, 2015, pp. 61-72.
    • (2015) Computer Communications , vol.68 , pp. 61-72
    • Li, F.1    Rahulamathavan, Y.2    Conti, M.3    Rajarajan, M.4
  • 11
    • 84924804821 scopus 로고    scopus 로고
    • Enabling efficient multi-keyword ranked search over encrypted Mobile Cloud Data Through Blind Storage
    • H. Li, D. Liu, Y. Dai, T.H. Luan, and X. Shen, "Enabling Efficient Multi-Keyword Ranked Search over Encrypted Mobile Cloud Data Through Blind Storage," IEEE Trans. Emerging Topics in Computing, vol. 3, no. 1, 2015, pp. 127-138.
    • (2015) IEEE Trans. Emerging Topics in Computing , vol.3 , Issue.1 , pp. 127-138
    • Li, H.1    Liu, D.2    Dai, Y.3    Luan, T.H.4    Shen, X.5
  • 12
    • 84940510005 scopus 로고    scopus 로고
    • Engineering searchable encryption of mobile cloud networks: When QoE Meets Qop
    • H. Li, D. Liu, Y. Dai, and T.H. Luan, "Engineering Searchable Encryption of Mobile Cloud Networks: When Qoe Meets Qop," IEEE Wireless Communications, vol. 22, no. 4, 2015, pp. 74-80.
    • (2015) IEEE Wireless Communications , vol.22 , Issue.4 , pp. 74-80
    • Li, H.1    Liu, D.2    Dai, Y.3    Luan, T.H.4
  • 14
    • 84901987724 scopus 로고    scopus 로고
    • Incremental proxy re-encryption scheme for mobile cloud Computing Environment
    • A.N. Khan, M.M. Kiah, S.A. Madani, M. Ali, and S. Shamshirband, "Incremental Proxy Re-Encryption Scheme for Mobile Cloud Computing Environment," J. Supercomputing, vol. 68, no. 2, 2014, pp. 624-651.
    • (2014) J. Supercomputing , vol.68 , Issue.2 , pp. 624-651
    • Khan, A.N.1    Kiah, M.M.2    Madani, S.A.3    Ali, M.4    Shamshirband, S.5
  • 15
    • 84960865942 scopus 로고    scopus 로고
    • An efficient and secure privacy-preserving approach for outsourced Data of Resource Constrained Mobile Devices in Cloud Computing
    • S.K. Pasupuleti, S. Ramalingam, and R. Buyya, "An Efficient and Secure Privacy-Preserving Approach for Outsourced Data of Resource Constrained Mobile Devices in Cloud Computing," J. Network and Computer Applications, vol. 64, 2016, pp. 12-22.
    • (2016) J. Network and Computer Applications , vol.64 , pp. 12-22
    • Pasupuleti, S.K.1    Ramalingam, S.2    Buyya, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.