메뉴 건너뛰기




Volumn 4, Issue 5, 2017, Pages 1143-1155

Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

Author keywords

Face identification; face resolution; fog computing; Internet of Things (IoT); privacy preservation; security

Indexed keywords

BIG DATA; CRYPTOGRAPHY; DIGITAL STORAGE; FOG; INTERNET OF THINGS; NETWORK FUNCTION VIRTUALIZATION; SECURITY OF DATA;

EID: 85020469257     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2017.2659783     Document Type: Article
Times cited : (214)

References (47)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey, " Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 2
    • 84930338781 scopus 로고    scopus 로고
    • A vision of IoT: Applications, challenges, and opportunities with China perspective
    • Aug.
    • S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of IoT: Applications, challenges, and opportunities with China perspective, " IEEE Internet Things J., vol. 1, no. 4, pp. 349-359, Aug. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.4 , pp. 349-359
    • Chen, S.1    Xu, H.2    Liu, D.3    Hu, B.4    Wang, H.5
  • 3
    • 84958816110 scopus 로고    scopus 로고
    • Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology
    • Mar.
    • H. Ning, H. Liu, J. Ma, L. T. Yang, and R. Huang, "Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology, " Future Gener. Comput. Syst., vol. 56, pp. 504-522, Mar. 2016.
    • (2016) Future Gener. Comput. Syst. , vol.56 , pp. 504-522
    • Ning, H.1    Liu, H.2    Ma, J.3    Yang, L.T.4    Huang, R.5
  • 4
    • 85000893446 scopus 로고    scopus 로고
    • Heterogeneous ad hoc networks: Architectures, advances and challenges
    • Feb.
    • T. Qiu, N. Chen, K. Li, D. Qiao, and Z. Fu, "Heterogeneous ad hoc networks: Architectures, advances and challenges, " Ad Hoc Netw., vol. 55, pp. 143-152, Feb. 2017.
    • (2017) Ad Hoc Netw. , vol.55 , pp. 143-152
    • Qiu, T.1    Chen, N.2    Li, K.3    Qiao, D.4    Fu, Z.5
  • 6
    • 80053998639 scopus 로고    scopus 로고
    • Cyber-individual meets brain informatics
    • Sep. /Oct.
    • J. Ma, J. Wen, R. Huang, and B. Huang, "Cyber-individual meets brain informatics, " IEEE Intell. Syst., vol. 26, no. 5, pp. 30-37, Sep. /Oct. 2011.
    • (2011) IEEE Intell. Syst. , vol.26 , Issue.5 , pp. 30-37
    • Ma, J.1    Wen, J.2    Huang, R.3    Huang, B.4
  • 7
    • 84925882350 scopus 로고    scopus 로고
    • From the Internet of Things to the Internet of people
    • Mar. /Apr.
    • J. Miranda et al., "From the Internet of Things to the Internet of people, " IEEE Internet Comput., vol. 19, no. 2, pp. 40-47, Mar. /Apr. 2015.
    • (2015) IEEE Internet Comput. , vol.19 , Issue.2 , pp. 40-47
    • Miranda, J.1
  • 8
    • 84922812202 scopus 로고    scopus 로고
    • Cyber-physical-social-thinking space based science and technology framework for the Internet of Things
    • H. Ning and H. Liu, "Cyber-physical-social-thinking space based science and technology framework for the Internet of Things, " Sci. China Inf. Sci., vol. 58, no. 3, pp. 1-19, 2015.
    • (2015) Sci. China Inf. Sci. , vol.58 , Issue.3 , pp. 1-19
    • Ning, H.1    Liu, H.2
  • 10
    • 77957589684 scopus 로고    scopus 로고
    • Ubiquitous ID: Standards for ubiquitous computing and the Internet of Things
    • Oct. /Dec.
    • N. Koshizuka and K. Sakamura, "Ubiquitous ID: Standards for ubiquitous computing and the Internet of Things, " IEEE Pervasive Comput., vol. 9, no. 4, pp. 98-101, Oct. /Dec. 2010.
    • (2010) IEEE Pervasive Comput. , vol.9 , Issue.4 , pp. 98-101
    • Koshizuka, N.1    Sakamura, K.2
  • 11
    • 84860852441 scopus 로고    scopus 로고
    • NID-based Internet of Things and its application in airport aviation risk management
    • H. Ning et al., "nID-based Internet of Things and its application in airport aviation risk management, " Chin. J. Electron., vol. 21, no. 2, pp. 209-214, 2012.
    • (2012) Chin. J. Electron. , vol.21 , Issue.2 , pp. 209-214
    • Ning, H.1
  • 12
    • 84925491351 scopus 로고    scopus 로고
    • Tree-code modeling and addressing for non-ID physical objects in the Internet of Things
    • H. Ning, Y. Fu, S. Hu, and H. Liu, "Tree-code modeling and addressing for non-ID physical objects in the Internet of Things, " Telecommun. Syst., vol. 58, no. 3, pp. 195-204, 2015.
    • (2015) Telecommun. Syst. , vol.58 , Issue.3 , pp. 195-204
    • Ning, H.1    Fu, Y.2    Hu, S.3    Liu, H.4
  • 13
    • 78649457148 scopus 로고    scopus 로고
    • Physimetric identification (physi-ID)-Applying biometric concept in physical object identification
    • S. K. Kwok, O. P. H. Ng, A. H. C. Tsang, and H. M. Liem, "Physimetric identification (physi-ID)-Applying biometric concept in physical object identification, " Comput. Ind., vol. 62, no. 1, pp. 32-41, 2011.
    • (2011) Comput. Ind. , vol.62 , Issue.1 , pp. 32-41
    • Kwok, S.K.1    Ng, O.P.H.2    Tsang, A.H.C.3    Liem, H.M.4
  • 15
    • 77951207098 scopus 로고    scopus 로고
    • Characteristic trade-offs in designing large-scale biometric-based identity management systems
    • S. A. Shaikh and J. R. Rabaiotti, "Characteristic trade-offs in designing large-scale biometric-based identity management systems, " J. Netw. Comput. Appl., vol. 33, no. 3, pp. 342-351, 2010.
    • (2010) J. Netw. Comput. Appl. , vol.33 , Issue.3 , pp. 342-351
    • Shaikh, S.A.1    Rabaiotti, J.R.2
  • 16
    • 85086760579 scopus 로고    scopus 로고
    • Stochastic load balancing for virtual resource management in datacenters
    • to be published.
    • L. Yu et al., "Stochastic load balancing for virtual resource management in datacenters, " IEEE Trans. Cloud Comput., to be published. [Online]. Available: https://doi. org/10. 1109/TCC. 2016. 2525984
    • IEEE Trans. Cloud Comput.
    • Yu, L.1
  • 17
    • 84897474874 scopus 로고    scopus 로고
    • Strategies for exploiting independent cloud implementations of biometric experts in multibiometric scenarios
    • Mar.
    • P. Peer, Ž. Emeršic, J. Bule, J. Žganec-Gros, and V. Štruc, "Strategies for exploiting independent cloud implementations of biometric experts in multibiometric scenarios, " Math. Problems Eng., vol. 2014, pp. 1-15, Mar. 2014.
    • (2014) Math. Problems Eng. , vol.2014 , pp. 1-15
    • Peer, P.1    Emeršic, Ž.2    Bule, J.3    Žganec-Gros, J.4    Štruc, V.5
  • 18
    • 85009999820 scopus 로고    scopus 로고
    • CoRE: Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost
    • Feb.
    • L. Yu, H. Shen, K. Sapra, L. Ye, and Z. Cai, "CoRE: Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost, " IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 2, pp. 446-461, Feb. 2017. [Online]. Available: https://doi. org/10. 1109/TPDS. 2016. 2578928
    • (2017) IEEE Trans. Parallel Distrib. Syst. , vol.28 , Issue.2 , pp. 446-461
    • Yu, L.1    Shen, H.2    Sapra, K.3    Ye, L.4    Cai, Z.5
  • 19
    • 84983319464 scopus 로고    scopus 로고
    • Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters
    • San Francisco, CA, USA
    • L. Yu and Z. Cai, "Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters, " in Proc. IEEE Conf. Comput. Commun. (INFOCOM), San Francisco, CA, USA, 2016, pp. 1-9.
    • (2016) Proc. IEEE Conf. Comput. Commun. (INFOCOM) , pp. 1-9
    • Yu, L.1    Cai, Z.2
  • 20
    • 85029709840 scopus 로고    scopus 로고
    • Fog computing: A better solution for IoT
    • N. N. Khan, "Fog computing: A better solution for IoT, " Int. J. Eng. Tech. Res., vol. 3, no. 2, pp. 298-300, 2015.
    • (2015) Int. J. Eng. Tech. Res. , vol.3 , Issue.2 , pp. 298-300
    • Khan, N.N.1
  • 22
    • 85029397733 scopus 로고    scopus 로고
    • Fog computingbased face identification and resolution scheme in Internet of Things
    • to be published
    • P. Hu, H. Ning, T. Qiu, Y. Zhang, and X. Luo, "Fog computingbased face identification and resolution scheme in Internet of Things, " IEEE Trans. Ind. Informat., to be published. [Online]. Available: https://doi. org/10. 1109/TII. 2016. 2607178
    • IEEE Trans. Ind. Informat.
    • Hu, P.1    Ning, H.2    Qiu, T.3    Zhang, Y.4    Luo, X.5
  • 23
    • 85009291777 scopus 로고    scopus 로고
    • A task-efficient sink node based on embedded multi-core soC for Internet of Things
    • Dec.
    • T. Qiu et al., "A task-efficient sink node based on embedded multi-core soC for Internet of Things, " Future Gener. Comput. Syst., Dec. 2016. Available: http://dx. doi. org/10. 1016/j. future. 2016. 12. 024
    • (2016) Future Gener. Comput. Syst.
    • Qiu, T.1
  • 24
    • 84901427258 scopus 로고    scopus 로고
    • A survey on trust management for Internet of Things
    • Y. Zheng, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things, " J. Netw. Comput. Appl., vol. 42, no. 3, pp. 120-134, 2014.
    • (2014) J. Netw. Comput. Appl. , vol.42 , Issue.3 , pp. 120-134
    • Zheng, Y.1    Zhang, P.2    Vasilakos, A.V.3
  • 26
    • 84991088919 scopus 로고    scopus 로고
    • Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
    • Dec.
    • Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, "Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.12 , pp. 2706-2716
    • Fu, Z.1    Wu, X.2    Guan, C.3    Sun, X.4    Ren, K.5
  • 27
    • 85026431678 scopus 로고    scopus 로고
    • Security enhancement for wireless multimedia communications by fountain code
    • Mar.
    • Q. Du, L. Sun, H. Song, and P. Ren, "Security enhancement for wireless multimedia communications by fountain code, " IEEE COMSOC MMTC Commun. C Front., vol. 11, no. 2, pp. 47-51, Mar. 2016.
    • (2016) IEEE COMSOC MMTC Commun. C Front. , vol.11 , Issue.2 , pp. 47-51
    • Du, Q.1    Sun, L.2    Song, H.3    Ren, P.4
  • 28
    • 84941286216 scopus 로고    scopus 로고
    • Policy-driven security management for fog computing: Preliminary framework and a case study
    • Redwood City, CA, USA
    • C. Dsouza, G.-J. Ahn, and M. Taguinod, "Policy-driven security management for fog computing: Preliminary framework and a case study, " in Proc. IEEE Int. Conf. Inf. Reuse Integr., Redwood City, CA, USA, 2014, pp. 16-23.
    • (2014) Proc. IEEE Int. Conf. Inf. Reuse Integr. , pp. 16-23
    • Dsouza, C.1    Ahn, G.-J.2    Taguinod, M.3
  • 29
    • 84958120409 scopus 로고    scopus 로고
    • Detection of man-in-The-middle attacks using physical layer wireless security techniques
    • L. Wang and A. M. Wyglinski, "Detection of man-in-the-middle attacks using physical layer wireless security techniques, " Wireless Commun. Mobile Comput., vol. 16, no. 4, pp. 408-426, 2016.
    • (2016) Wireless Commun. Mobile Comput. , vol.16 , Issue.4 , pp. 408-426
    • Wang, L.1    Wyglinski, A.M.2
  • 30
    • 84928596525 scopus 로고    scopus 로고
    • An overview of fog computing and its security issues
    • I. Stojmenovic, S. Wen, X. Huang, and H. Luan, "An overview of fog computing and its security issues, " Concurrency Comput. Pract. Exp., vol. 28, no. 1, pp. 2991-3005, 2016.
    • (2016) Concurrency Comput. Pract. Exp. , vol.28 , Issue.1 , pp. 2991-3005
    • Stojmenovic, I.1    Wen, S.2    Huang, X.3    Luan, H.4
  • 33
    • 84935496015 scopus 로고    scopus 로고
    • CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
    • M. Haghighat, S. Zonouz, and M. Abdel-Mottaleb, "CloudID: Trustworthy cloud-based and cross-enterprise biometric identification, " Expert Syst. Appl., vol. 42, no. 21, pp. 7905-7916, 2015.
    • (2015) Expert Syst. Appl. , vol.42 , Issue.21 , pp. 7905-7916
    • Haghighat, M.1    Zonouz, S.2    Abdel-Mottaleb, M.3
  • 34
    • 84912535405 scopus 로고    scopus 로고
    • A framework for secure cloud-empowered mobile biometrics
    • Baltimore, MD, USA
    • A. S. Bommagani, M. C. Valenti, and A. Ross, "A framework for secure cloud-empowered mobile biometrics, " in Proc. IEEE Mil. Commun. Conf. (MILCOM), Baltimore, MD, USA, 2014, pp. 255-261.
    • (2014) Proc. IEEE Mil. Commun. Conf. (MILCOM) , pp. 255-261
    • Bommagani, A.S.1    Valenti, M.C.2    Ross, A.3
  • 35
    • 84883119889 scopus 로고    scopus 로고
    • Efficient privacy-preserving biometric identification in cloud computing
    • Turin, Italy
    • J. Yuan and S. Yu, "Efficient privacy-preserving biometric identification in cloud computing, " in Proc. IEEE INFOCOM, Turin, Italy, 2013, pp. 2652-2660.
    • (2013) Proc. IEEE INFOCOM , pp. 2652-2660
    • Yuan, J.1    Yu, S.2
  • 36
    • 84986631527 scopus 로고    scopus 로고
    • A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
    • Nov.
    • Z. Xia et al., "A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.11 , pp. 2594-2608
    • Xia, Z.1
  • 37
    • 84961877275 scopus 로고    scopus 로고
    • On security and privacy issues of fog computing supported Internet of Things environment
    • Montreal, QC, Canada
    • K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, "On security and privacy issues of fog computing supported Internet of Things environment, " in Proc. 6th Int. Conf. Netw. Future (NOF), Montreal, QC, Canada, 2015, pp. 1-3.
    • (2015) Proc. 6th Int. Conf. Netw. Future (NOF) , pp. 1-3
    • Lee, K.1    Kim, D.2    Ha, D.3    Rajput, U.4    Oh, H.5
  • 40
    • 33947167478 scopus 로고    scopus 로고
    • Face description with local binary patterns: Application to face recognition
    • Dec.
    • T. Ahonen, A. Hadid, and M. Pietikainen, "Face description with local binary patterns: Application to face recognition, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 12, pp. 2037-2041, Dec. 2006.
    • (2006) IEEE Trans. Pattern Anal. Mach. Intell. , vol.28 , Issue.12 , pp. 2037-2041
    • Ahonen, T.1    Hadid, A.2    Pietikainen, M.3
  • 41
    • 84863403882 scopus 로고    scopus 로고
    • Computing the principal local binary patterns for face recognition using data mining tools
    • F. A. Pujol and J. C. Garcia, "Computing the principal local binary patterns for face recognition using data mining tools, " Expert Syst. Appl., vol. 39, no. 8, pp. 7165-7172, 2012.
    • (2012) Expert Syst. Appl. , vol.39 , Issue.8 , pp. 7165-7172
    • Pujol, F.A.1    Garcia, J.C.2
  • 42
    • 0036647193 scopus 로고    scopus 로고
    • Multiresolution gray-scale and rotation invariant texture classification with local binary patterns
    • Jul.
    • T. Ojala, M. Pietikäinen, and T. Mäenpää, "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 7, pp. 971-987, Jul. 2002.
    • (2002) IEEE Trans. Pattern Anal. Mach. Intell. , vol.24 , Issue.7 , pp. 971-987
    • Ojala, T.1    Pietikäinen, M.2    Mäenpää, T.3
  • 43
    • 17744406666 scopus 로고    scopus 로고
    • An extended set of haar-like features for rapid object detection
    • Rochester, NY, USA
    • R. Lienhart and J. Maydt, "An extended set of haar-like features for rapid object detection, " in Proc. Int. Conf. Image Process., Rochester, NY, USA, 2002, pp. I-900-I-903.
    • (2002) Proc. Int. Conf. Image Process. , pp. I900-I903
    • Lienhart, R.1    Maydt, J.2
  • 44
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, "New directions in cryptography, " IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 45
    • 77950188068 scopus 로고    scopus 로고
    • Enhancing intelligence and dependability of a product line enabled pervasive middleware
    • W. Zhang, K. M. Hansen, and T. Kunz, "Enhancing intelligence and dependability of a product line enabled pervasive middleware, " Pervasive Mobile Comput., vol. 6, no. 2, pp. 198-217, 2010.
    • (2010) Pervasive Mobile Comput. , vol.6 , Issue.2 , pp. 198-217
    • Zhang, W.1    Hansen, K.M.2    Kunz, T.3
  • 46
    • 0348003132 scopus 로고    scopus 로고
    • The state of elliptic curve cryptography
    • N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography, " Designs Codes Cryptography, vol. 19, nos. 2-3, pp. 173-193, 2000.
    • (2000) Designs Codes Cryptography , vol.19 , Issue.2-3 , pp. 173-193
    • Koblitz, N.1    Menezes, A.2    Vanstone, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.