4.8 Article

Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 15, 期 1, 页码 457-468

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2018.2824815

关键词

Attribute-based encryption; distributed mobile cloud computing (MCC); fine-grained access control; healthcare industry 4.0; proverif simulation; security; user authentication

资金

  1. Information Security Education & Awareness Phase II Project
  2. Department of Electronics and Information Technology, India
  3. Fundacao para a Ciencia e a Tecnologia [UID/EEA/50008/2013]
  4. Government of the Russian Federation [074-U01]
  5. Brazilian National Council for Research and Development [309335/2017-5]
  6. Finep
  7. Funttel, the Centro de Referencia em Radicomunicacoes Project of the Instituto Nacional de Telecomunicacoes (Inatel), Brazil [01.14.0231.00]

向作者/读者索取更多资源

Mobile cloud computing (MCC) allows mobile users to have on-demand access to cloud services. A mobile cloud model helps in analyzing the information regarding the patients' records and also in extracting recommendations in healthcare applications. In MCC, a fine-grained level access control of multiserver cloud data is a prerequisite for successful execution of end-users applications. In this paper, we propose a new scheme that provides a combined approach of fine-grained access control over cloud-based multiserver data along with a provably secure mobile user authentication mechanism for the Healthcare Industry 4.0. To the best of our knowledge, the proposed scheme is the first to pursue fine-grained data access control over multiple cloud servers in a MCC environment. The proposed scheme has been validated extensively in differ-ent heterogeneous environment where its performance was found good in comparison to other existing schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

TSDroid: A Novel Android Malware Detection Framework Based on Temporal & Spatial Metrics in IoMT

Gaofeng Zhang, Yu Li, Xudan Bao, Chinmay Chakarborty, Joel J. P. C. Rodrigues, Liping Zheng, Xuyun Zhang, Lianyong Qi, Mohammad R. Khosravi

Summary: In the era of smart healthcare, numerous smart devices are aiding cognitive computing in order to achieve lower costs and smarter diagnostics. Android system is widely used in the IoMT field as the primary operating system. However, the rise of Android malware has become a major security concern in healthcare, posing serious threats such as private information leaks and misuse of critical operations. Existing methods focus on sustainable classification models but fail to consider the key factor of system API aging. This study proposes a novel framework, TSDroid, that combines temporal and spatial metrics for clustering and enhances malware detection.

ACM TRANSACTIONS ON SENSOR NETWORKS (2023)

Article Computer Science, Information Systems

Security in IoT-enabled smart agriculture: architecture, security solutions and challenges

Anusha Vangala, Ashok Kumar Das, Vinay Chamola, Valery Korotaev, Joel J. P. C. Rodrigues

Summary: Agricultural industry, being a vital contributor to the economy, has witnessed significant changes in its operation with the advancement of precision farming and IoT. This paper explores the security scenarios in husbandry and proposes an architecture for smart farming. It conducts a literature survey on security protocols and authentication protocols in smart agriculture, as well as studies the current progress in IoT-based tools and systems.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Engineering, Civil

Edge Computation Offloading With Content Caching in 6G-Enabled IoV

Xuanhong Zhou, Muhammad Bilal, Ruihan Dou, Joel J. P. C. Rodrigues, Qingzhan Zhao, Jianguo Dai, Xiaolong Xu

Summary: In this research, a Computation Offloading method with Demand prediction and Reinforcement learning (CODR) is proposed to provide low-delay in-vehicle services in the Internet of Vehicles (IoV) using the powerful communication capability of 6G. CODR utilizes prediction based on Spatial-Temporal Graph Neural Network (STGNN) for demand, caching decision based on simplex algorithm, and computation offloading based on twin delayed deterministic policy gradient (TD3) to achieve optimal offloading scheme in 6G-enabled IoV.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Semantics-Aware Dynamic Graph Convolutional Network for Traffic Flow Forecasting

Guojun Liang, U. Kintak, Xin Ning, Prayag Tiwari, Slawomir Nowaczyk, Neeraj Kumar

Summary: In this paper, the authors propose a novel Semantics-aware Dynamic Graph Convolutional Network (SDGCN) for traffic flow forecasting, which adaptively builds dynamic Laplacian matrices by considering the trip pattern and motivation of traffic flows. Experimental results show that SDGCN outperforms existing traffic flow forecasting methods and provides better explanations of the generative Laplace matrices, making it suitable for traffic flow forecasting in large cities and providing insights into the causes of various phenomena such as traffic congestion.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Intelligent Reflecting Surface Aided NOMA-HARQ Based IoT Framework for Future Wireless Networks

Debbarni Sarkar, Satyendra Singh Yadav, Vipin Pal, Yogita, Neeraj Kumar

Summary: In this paper, an IRS aided downlink NOMA-HARQ based IoT framework is proposed to enhance the IoT devices' performance in non-line-of-sight (NLoS) region. Two NOMA-HARQ aided IRS schemes, namely NOMA-SC with IRS and NOMA-MRC with IRS, are proposed to enhance the performance of NLoS IoT devices/users. Simulation results demonstrate that these proposed schemes outperform conventional NOMA-HARQ in terms of achievable data rates, outage probability, bit error rate (BER), and diversity order.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Artificial Intelligence

Federated learning for 6G-enabled secure communication systems: a comprehensive survey

Deepika Sirohi, Neeraj Kumar, Prashant Singh Rana, Sudeep Tanwar, Rahat Iqbal, Mohammad Hijjii

Summary: Machine learning and Deep learning models are widely used in various fields. Conventional centralized training techniques may not be suitable for distributed applications. Federated learning is a developing approach that allows collaboration and distributed training. However, distributed learning faces challenges such as data heterogeneity, scalability, and security threats. Therefore, a structured vulnerability and risk assessment is needed for successful deployment.

ARTIFICIAL INTELLIGENCE REVIEW (2023)

Article Computer Science, Hardware & Architecture

SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme

Jaskaran Singh, Keshav Sharma, Mohammad Wazid, Ashok Kumar Das

Summary: Multiple kinds of ransomware are a growing threat to Internet users. The ransomware encrypts important user data and requires payment of a ransom. The rise of ransomware attacks may be influenced by the trend of crypto-currencies. This article proposes a novel ransomware detection scheme based on Spline Interpolation envisioned Neural Network (SINN-RD) and demonstrates its effectiveness through security analysis and practical implementation, achieving a high accuracy value of 99.83% in comparative study.

COMPUTERS & ELECTRICAL ENGINEERING (2023)

Article Engineering, Electrical & Electronic

Mitigating Jamming Attack in 5G Heterogeneous Networks: A Federated Deep Reinforcement Learning Approach

Himanshu Sharma, Neeraj Kumar, Rajkumar Tekchandani

Summary: A federated deep reinforcement learning-based anti-jamming technique is proposed to address the security issues in 5G HetNets. By optimizing beamforming and power allocation, the proposed scheme improves the achievable rate for users. Simulation results show that the proposed federated DRL scheme outperforms other schemes in terms of achievable rate.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Blockchain Based Optimized Energy Trading for E-Mobility Using Quantum Reinforcement Learning

Manoj Kumar, Upasana Dohare, Sushil Kumar, Neeraj Kumar

Summary: Using microgrids to charge Electric Vehicles (EVs) is a significant step toward achieving Electric mobility. The microgrids generate electricity for self-use and sell surplus energy locally in a Peer-to-Peer (P2P) manner. However, the energy trading decision for microgrids is challenging due to uncertainties and the lack of information about other competitive microgrids.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Software Engineering

CLAACS-IOD: Certificate-embedded lightweight authentication and access control scheme for Internet of Drones

Dipanwita Sadhukhan, Sangram Ray, Mou Dasgupta, Joel J. P. C. Rodrigues

Summary: In recent years, drones have emerged as one of the most significant and promising tools with a wide range of applications in various domains. However, there are security concerns regarding the communication between drones, including safety threats and confidentiality issues. This article introduces an access control approach using digital certificates to address these concerns and ensure secure communication between drones.

SOFTWARE-PRACTICE & EXPERIENCE (2023)

Article Engineering, Electrical & Electronic

BAT: Barabasi-Albert With Topsis Scale-Free Topology Evolution for Load-Balanced WSNs

Ikkurthi Bhanu Prasad, Yogita, Satyendra Singh Yadav, Neeraj Kumar, Vipin Pal

Summary: Clustering techniques, such as the proposed BAT protocol, using the Barabasi-Albert (BA) model and Topsis (T) technique, are effective in balancing the load and energy consumption among sensor nodes in wireless sensor networks. The BAT protocol ensures even energy consumption and avoids energy holes in the network, resulting in a better stable region and balanced energy-efficient consumption compared to other simulated protocols.

IEEE SENSORS JOURNAL (2023)

Article Computer Science, Information Systems

A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment

Salman Shamshad, Khalid Mahmood, Usman Shamshad, Ibrar Hussain, Shafiq Hussain, Ashok Kumar Das

Summary: The energy Internet (EI) is a revolutionary paradigm for renewable energy distribution that utilizes communication and computing technologies to improve intelligent transportation systems and power grids, supporting open innovation. Ensuring secure and efficient renewable energy distribution requires efficient and secure key negotiation. In this study, a robust scheme is proposed, utilizing a widely accepted formal model and showing satisfactory security features. Performance evaluation results demonstrate significant improvements in security and reduced communication, computation, and energy overhead compared to existing competitive schemes.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems Using Blockchain and PUF

Seunghwan Son, Deokkyu Kwon, Sangwoo Lee, Yongsung Jeon, Ashok Kumar Das, Youngho Park

Summary: Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) combines traditional vehicular ad hoc networks (VANETs) with UAVs to monitor road conditions and provide various services. However, real-time communication between UAVs and RSUs is hindered by limited computing powers and potential attacks. This article proposes a secure and lightweight authentication scheme using blockchain technology, which performs better than related schemes according to analysis and comparison.

IEEE ACCESS (2023)

Article Geochemistry & Geophysics

Attentive-Adaptive Network for Hyperspectral Images Classification With Noisy Labels

Leiquan Wang, Tongchuan Zhu, Neeraj Kumar, Zhongwei Li, Chunlei Wu, Peiying Zhang

Summary: With the development of deep neural networks, hyperspectral image (HSI) classification systems have achieved a significant improvement. To handle noisy labels in hyperspectral classification, an end-to-end attentive-adaptive network (AAN) is proposed for robust HSI classification training. The effectiveness of AAN on HSI classification is demonstrated through experimental results on three benchmark datasets.

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING (2023)

Article Computer Science, Information Systems

Multi-Target-Aware Energy Orchestration Modeling for Grid 2.0: A Network Virtualization Approach

Lianzhong Wang, Zhe Zheng, Ning Chen, Yingying Chi, Yong Liu, Hailong Zhu, Peiying Zhang, Neeraj Kumar

Summary: Smart Grid- Grid 2.0 is a promising grid scenario with low cost, high reliability, and high security. However, the complex task interaction and differentiated QoS requirements pose challenges to energy orchestration. This paper proposes an energy orchestration strategy based on Virtual Network Embedding (VNE) to better support the operation and maintenance of Grid 2.0.

IEEE ACCESS (2023)

暂无数据