Article
Computer Science, Information Systems
Payal Chaudhari, Manik Lal Das
Summary: Searchable encryption allows cloud servers to search encrypted data without decryption. Single keyword-based encryption enables users to access subsets of documents containing specific keywords. The scheme presented in this paper uses attribute-based encryption to grant access to selective data subsets while maintaining user privacy.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2021)
Article
Computer Science, Information Systems
Xin Liu, Hao Wang, Bo Zhang, Bin Zhang
Summary: The proposed ciphertext policy attribute-based encryption method combines with k-times anonymous authentication technology to construct a fine-grained data access control system, ensuring that user computation cost is independent of the size of the access control policy. The system supports user revocation and attribute updates, and is proven to be secure under formal proofs.
INFORMATION SCIENCES
(2022)
Article
Computer Science, Hardware & Architecture
K. Dhal, S. C. Rai, P. K. Pattnaik, S. Tripathy
Summary: The article introduces a scheme named CEMAR to tackle data sharing security issues in cloud computing. The scheme improves communication efficiency while reducing computational burdens at the user end, and the security is verified using the Random-Oracle assumption.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Haijiang Wang, Jianting Ning, Xinyi Huang, Guiyi Wei, Geong Sen Poh, Ximeng Liu
Summary: The popularity of e-Healthcare systems has been increasing with the introduction of wearable healthcare devices and sensors, which collect personal health records stored in a remote cloud. To ensure privacy and secure access control, attributes based encryption (ABE) and searchable encryption are being utilized. This efficient hidden policy ABE scheme with keyword search enables efficient keyword search with constant computational overhead and storage overhead, while also enhancing recipient's privacy by hiding the access policy. Additionally, a trapdoor malleability attack is presented, revealing potential vulnerabilities in previous schemes.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Computer Science, Information Systems
Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu
Summary: Healthcare Internet-of-Things (IoT) is a new paradigm that connects embedded devices to the cloud for monitoring patient vital signals and data aggregation. However, there are security concerns with the cloud due to untrusted network environments and limited resources. To address this, this paper proposes a novel healthcare IoT system that combines attribute-based encryption, cloud and edge computing to provide efficient, flexible, secure fine-grained access control and data verification, without the need for a secure channel.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Article
Computer Science, Information Systems
Hui Ma, Rui Zhang, Shuzhou Sun, Zishuai Song, Gaosheng Tan
Summary: This paper introduces an innovative application of attribute-based encryption in cloud storage services, which enables fine-grained access control over encrypted data. By leveraging the storage, computing, and management capabilities of the cloud, efficient access control and user revocation are achieved, and most of the complex operations are outsourced to the public cloud server.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu, Athanasios V. Vasilakos
Summary: The rapid development of cloud computing and IoT has the potential to significantly improve healthcare quality through smart health (s-health). However, existing s-health solutions have not adequately addressed concerns regarding data integrity, user anonymity, and authentication. To address these issues, a new aggregate anonymous attribute-based remote data verification scheme called A(3)B-RDV is introduced. It provides efficient and secure verification of the integrity of multiple cloud data files, while also ensuring complete anonymity and supporting dishonest-user traceability.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Artificial Intelligence
Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Yuanzhang Li, Shangbo Wu
Summary: The proposed secure data-sharing model for intelligent terminals in multi-domain settings ensures fine-grained and traceable sharing of data through key self-certification algorithm and blockchain technology.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Computer Science, Theory & Methods
Donghyun Yu, Ruei-Hau Hsu, Jemin Lee, Sungjin Lee
Summary: In-vehicle communications face security issues due to insufficient design and lack of resources. This paper proposes a solution by offloading secure operations, implementing attribute-based access control, and reconfiguring cryptographic schemes, to ensure secure message transmission in the in-vehicle network.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Biochemical Research Methods
Qinlong Huang, Wei Yue, Yixian Yang, Lixuan Chen
Summary: With the development of bioinformatics and genetic sequencing technologies, genomic data is widely used in personalized medicine. Cloud computing provides a cost-effective and efficient solution for the challenges brought by massive genomic data. This paper proposes P2GT and P2GT+ schemes that utilize encryption techniques and equality tests to protect and authorize genetic testing in cloud computing, and experimental results demonstrate their practicality and scalability.
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS
(2022)
Article
Computer Science, Information Systems
Peixuan He, Kaiping Xue, Jiayu Yang, Qiudong Xia, Jianqing Liu, David S. L. Wei
Summary: The paper proposes a Fine-grained Accountable and Space-Efficient access control scheme, named FASE, for multimedia content distribution. FASE allows content providers to be fully offline and ensures secure fine-grained access control through attribute-based encryption at multimedia content provider side and access policy based authentication at the edge router side.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2021)
Article
Computer Science, Hardware & Architecture
Huiying Hou, Jianting Ning, Yunlei Zhao, Robert Deng
Summary: With the growing popularity of cloud storage services, non-interactive data sharing has become possible. However, to ensure the timeliness and authority of shared data, there is a need for a fine-grained and controllably editable cloud-based data sharing scheme that can also support malicious user tracing.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Yangyang Bao, Weidong Qiu, Peng Tang, Xiaochun Cheng
Summary: This paper proposes an ERPF-DS-KS scheme to address the data security and privacy issues in cloud-assisted MIoT, realizing efficient and fine-grained access control and ciphertext keyword search. It provides data authenticity through a pseudo identity-based signature mechanism and enables flexible indirect revocation of malicious data users.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
(2022)
Article
Engineering, Civil
Yangyang Bao, Weidong Qiu, Xiaochun Cheng, Jianfei Sun
Summary: The Internet of Vehicles (IoV) has revolutionized the driving experience and urban traffic management. This paper proposes an efficient access control scheme and an indirect revocation mechanism to address data leakage and personal privacy concerns in the publicly accessible IoV environment. Through detailed comparisons and simulation evaluations, the superiority of the proposed solutions in terms of functionality and performance is demonstrated.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Information Systems
Zuobin Ying, Wenjie Jiang, Ximeng Liu, Shengmin Xu, Robert H. Deng
Summary: Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a powerful encryption paradigm for data confidentiality in cloud data sharing. However, the access policy in traditional CP-ABE reveals sensitive information. To address this, this article proposes a novel CP-ABE system called Privacy-Preserving Policy Updating ABE (3PU-ABE), which utilizes a security-enhanced Attribute Cuckoo Filter (se-ACF) to hide the access policy and enable policy updating.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Gaofeng Zhang, Yu Li, Xudan Bao, Chinmay Chakarborty, Joel J. P. C. Rodrigues, Liping Zheng, Xuyun Zhang, Lianyong Qi, Mohammad R. Khosravi
Summary: In the era of smart healthcare, numerous smart devices are aiding cognitive computing in order to achieve lower costs and smarter diagnostics. Android system is widely used in the IoMT field as the primary operating system. However, the rise of Android malware has become a major security concern in healthcare, posing serious threats such as private information leaks and misuse of critical operations. Existing methods focus on sustainable classification models but fail to consider the key factor of system API aging. This study proposes a novel framework, TSDroid, that combines temporal and spatial metrics for clustering and enhances malware detection.
ACM TRANSACTIONS ON SENSOR NETWORKS
(2023)
Article
Computer Science, Information Systems
Anusha Vangala, Ashok Kumar Das, Vinay Chamola, Valery Korotaev, Joel J. P. C. Rodrigues
Summary: Agricultural industry, being a vital contributor to the economy, has witnessed significant changes in its operation with the advancement of precision farming and IoT. This paper explores the security scenarios in husbandry and proposes an architecture for smart farming. It conducts a literature survey on security protocols and authentication protocols in smart agriculture, as well as studies the current progress in IoT-based tools and systems.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Civil
Xuanhong Zhou, Muhammad Bilal, Ruihan Dou, Joel J. P. C. Rodrigues, Qingzhan Zhao, Jianguo Dai, Xiaolong Xu
Summary: In this research, a Computation Offloading method with Demand prediction and Reinforcement learning (CODR) is proposed to provide low-delay in-vehicle services in the Internet of Vehicles (IoV) using the powerful communication capability of 6G. CODR utilizes prediction based on Spatial-Temporal Graph Neural Network (STGNN) for demand, caching decision based on simplex algorithm, and computation offloading based on twin delayed deterministic policy gradient (TD3) to achieve optimal offloading scheme in 6G-enabled IoV.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Guojun Liang, U. Kintak, Xin Ning, Prayag Tiwari, Slawomir Nowaczyk, Neeraj Kumar
Summary: In this paper, the authors propose a novel Semantics-aware Dynamic Graph Convolutional Network (SDGCN) for traffic flow forecasting, which adaptively builds dynamic Laplacian matrices by considering the trip pattern and motivation of traffic flows. Experimental results show that SDGCN outperforms existing traffic flow forecasting methods and provides better explanations of the generative Laplace matrices, making it suitable for traffic flow forecasting in large cities and providing insights into the causes of various phenomena such as traffic congestion.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Engineering, Electrical & Electronic
Debbarni Sarkar, Satyendra Singh Yadav, Vipin Pal, Yogita, Neeraj Kumar
Summary: In this paper, an IRS aided downlink NOMA-HARQ based IoT framework is proposed to enhance the IoT devices' performance in non-line-of-sight (NLoS) region. Two NOMA-HARQ aided IRS schemes, namely NOMA-SC with IRS and NOMA-MRC with IRS, are proposed to enhance the performance of NLoS IoT devices/users. Simulation results demonstrate that these proposed schemes outperform conventional NOMA-HARQ in terms of achievable data rates, outage probability, bit error rate (BER), and diversity order.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Artificial Intelligence
Deepika Sirohi, Neeraj Kumar, Prashant Singh Rana, Sudeep Tanwar, Rahat Iqbal, Mohammad Hijjii
Summary: Machine learning and Deep learning models are widely used in various fields. Conventional centralized training techniques may not be suitable for distributed applications. Federated learning is a developing approach that allows collaboration and distributed training. However, distributed learning faces challenges such as data heterogeneity, scalability, and security threats. Therefore, a structured vulnerability and risk assessment is needed for successful deployment.
ARTIFICIAL INTELLIGENCE REVIEW
(2023)
Article
Computer Science, Hardware & Architecture
Jaskaran Singh, Keshav Sharma, Mohammad Wazid, Ashok Kumar Das
Summary: Multiple kinds of ransomware are a growing threat to Internet users. The ransomware encrypts important user data and requires payment of a ransom. The rise of ransomware attacks may be influenced by the trend of crypto-currencies. This article proposes a novel ransomware detection scheme based on Spline Interpolation envisioned Neural Network (SINN-RD) and demonstrates its effectiveness through security analysis and practical implementation, achieving a high accuracy value of 99.83% in comparative study.
COMPUTERS & ELECTRICAL ENGINEERING
(2023)
Article
Engineering, Electrical & Electronic
Himanshu Sharma, Neeraj Kumar, Rajkumar Tekchandani
Summary: A federated deep reinforcement learning-based anti-jamming technique is proposed to address the security issues in 5G HetNets. By optimizing beamforming and power allocation, the proposed scheme improves the achievable rate for users. Simulation results show that the proposed federated DRL scheme outperforms other schemes in terms of achievable rate.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Engineering, Electrical & Electronic
Manoj Kumar, Upasana Dohare, Sushil Kumar, Neeraj Kumar
Summary: Using microgrids to charge Electric Vehicles (EVs) is a significant step toward achieving Electric mobility. The microgrids generate electricity for self-use and sell surplus energy locally in a Peer-to-Peer (P2P) manner. However, the energy trading decision for microgrids is challenging due to uncertainties and the lack of information about other competitive microgrids.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Software Engineering
Dipanwita Sadhukhan, Sangram Ray, Mou Dasgupta, Joel J. P. C. Rodrigues
Summary: In recent years, drones have emerged as one of the most significant and promising tools with a wide range of applications in various domains. However, there are security concerns regarding the communication between drones, including safety threats and confidentiality issues. This article introduces an access control approach using digital certificates to address these concerns and ensure secure communication between drones.
SOFTWARE-PRACTICE & EXPERIENCE
(2023)
Article
Engineering, Electrical & Electronic
Ikkurthi Bhanu Prasad, Yogita, Satyendra Singh Yadav, Neeraj Kumar, Vipin Pal
Summary: Clustering techniques, such as the proposed BAT protocol, using the Barabasi-Albert (BA) model and Topsis (T) technique, are effective in balancing the load and energy consumption among sensor nodes in wireless sensor networks. The BAT protocol ensures even energy consumption and avoids energy holes in the network, resulting in a better stable region and balanced energy-efficient consumption compared to other simulated protocols.
IEEE SENSORS JOURNAL
(2023)
Article
Computer Science, Information Systems
Salman Shamshad, Khalid Mahmood, Usman Shamshad, Ibrar Hussain, Shafiq Hussain, Ashok Kumar Das
Summary: The energy Internet (EI) is a revolutionary paradigm for renewable energy distribution that utilizes communication and computing technologies to improve intelligent transportation systems and power grids, supporting open innovation. Ensuring secure and efficient renewable energy distribution requires efficient and secure key negotiation. In this study, a robust scheme is proposed, utilizing a widely accepted formal model and showing satisfactory security features. Performance evaluation results demonstrate significant improvements in security and reduced communication, computation, and energy overhead compared to existing competitive schemes.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Seunghwan Son, Deokkyu Kwon, Sangwoo Lee, Yongsung Jeon, Ashok Kumar Das, Youngho Park
Summary: Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) combines traditional vehicular ad hoc networks (VANETs) with UAVs to monitor road conditions and provide various services. However, real-time communication between UAVs and RSUs is hindered by limited computing powers and potential attacks. This article proposes a secure and lightweight authentication scheme using blockchain technology, which performs better than related schemes according to analysis and comparison.
Article
Geochemistry & Geophysics
Leiquan Wang, Tongchuan Zhu, Neeraj Kumar, Zhongwei Li, Chunlei Wu, Peiying Zhang
Summary: With the development of deep neural networks, hyperspectral image (HSI) classification systems have achieved a significant improvement. To handle noisy labels in hyperspectral classification, an end-to-end attentive-adaptive network (AAN) is proposed for robust HSI classification training. The effectiveness of AAN on HSI classification is demonstrated through experimental results on three benchmark datasets.
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
(2023)
Article
Computer Science, Information Systems
Lianzhong Wang, Zhe Zheng, Ning Chen, Yingying Chi, Yong Liu, Hailong Zhu, Peiying Zhang, Neeraj Kumar
Summary: Smart Grid- Grid 2.0 is a promising grid scenario with low cost, high reliability, and high security. However, the complex task interaction and differentiated QoS requirements pose challenges to energy orchestration. This paper proposes an energy orchestration strategy based on Virtual Network Embedding (VNE) to better support the operation and maintenance of Grid 2.0.