[go: up one dir, main page]

Puthal et al., 2016 - Google Patents

DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream

Puthal et al., 2016

View PDF
Document ID
4885064353141267634
Author
Puthal D
Nepal S
Ranjan R
Chen J
Publication year
Publication venue
ACM Transactions on Embedded Computing Systems (TECS)

External Links

Snippet

Applications in risk-critical domains such as emergency management and industrial control systems need near-real-time stream data processing in large-scale sensing networks. The key problem is how to ensure online end-to-end security (eg, confidentiality, integrity, and …
Continue reading at rajivranjan.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Puthal et al. DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream
Puthal et al. A dynamic key length based approach for real-time security verification of big sensing data stream
Puthal et al. SEEN: A selective encryption method to ensure confidentiality for big sensing data streams
Zawoad et al. Towards building forensics enabled cloud through secure logging-as-a-service
Waziri et al. Network security in cloud computing with elliptic curve cryptography
Hota et al. Capability-based cryptographic data access control in cloud computing
Goswami et al. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
Puthal et al. DPBSV--an efficient and secure scheme for big sensing data stream
Contiu et al. Anonymous and confidential file sharing over untrusted clouds
Puthal et al. A synchronized shared key generation method for maintaining end-to-end security of big data streams
Nguyen et al. LogSafe: Secure and scalable data logger for IoT devices
US11496287B2 (en) Privacy preserving fully homomorphic encryption with circuit verification
Whaiduzzaman et al. AUASF: An anonymous users authentication scheme for fog-IoT environment
Rekhate et al. Secure and efficient message passing in distributed systems using one-time pad
Park et al. An SGX-based key management framework for data centric networking
Joseph Antony et al. A blockchain-based public key infrastructure for IoT-based healthcare systems
Castiglione et al. A secure file sharing service for distributed computing environments
Bhardwaj et al. Review of solutions for securing end user data over cloud applications
Quan et al. TSHC: trusted scheme for Hadoop cluster
Moghaddam et al. A reliable data protection model based on re-encryption concepts in cloud environments
Karl et al. Cryptonite: a framework for flexible time-series secure aggregation with non-interactive fault recovery
Neela DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security
Will et al. Anonymous data sharing between organisations with elliptic curve cryptography
Ennahbaoui et al. Zero-knowledge authentication and intrusion detection system for grid computing security
Kahvazadeh Security architecture for Fog-To-Cloud continuum system