Game Theory Based Correlated Pr ivacy Preser ving Analysis in Big Data Abstract-The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive and crucial. In addition, the key requirements of SH-IoT include channel security, handover support, mobility management, and consistent data rates. Proxy Mobile IPv6 (PMIPv6)…
Secure Anonymous Key Distribution Scheme for Smart Grid Abstract? Secure Anonymous Key Distribution Scheme for Smart Grid. To fully support information management among various < Final Year Projects 2016 > stakeholders in smart grid domains, how to establish secure communication sessions has become an important issue for smart grid environments. In order to support secure…
Secure Auditing and Deduplicating Data in Cloud Abstract? Secure Auditing and Deduplicating Data in Cloud. As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which bene?ts in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not…
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure Abstract-In the first place, with the fast growing demands for the big data, we need to manage and store the big data in the cloud. Since the cloud is not fully trusted and it can be accessed by any users, the data in the…
Secure Cloud Storage Meets with Secure Network Coding Abstract? Secure Cloud Storage Meets with Secure Network Coding. Reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two…
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract?Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such…
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract? Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods…
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Abstract? In cloud storage services, deduplication technology is commonly used to reduce the space and bandwidth requirements of services by eliminating redundant data and storing only a single copy of them. Deduplication is most effective when multiple users outsource the same data to the cloud…
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing Abstract-With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over ciphertext associated with multiple owners, which makes…
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers…
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Abstract? Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain…
Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing Abstract-With the fast development of Industrial Internet of Things (IIoT), a large amount of data is being generated continuously by different sources. Storing all the raw data in the IIoT devices locally is unwise considering that the end devices? energy…