Search
Now showing items 11-20 of 30
Fog-Based Conditional Privacy-Preserving Data Batch Verification in Smart Grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
The smart grid is already widespread for the purpose of managing energy generation and distribution. In this system, frequent interactions between devices generate mass data, which requires robust processing capability. ...
Haddle: A framework for investigating data leakage attacks in hadoop
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ...
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)
BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ...
Auditing cloud service level agreement on VM CPU speed
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...
A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ...
An Efficient Network Coding Scheme for Heterogeneous Wireless Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
As the demand of mobile services for high bandwidth grows, aggregation of various wireless network resources in hybrid communication system becomes a trend. Network coding has been widely studied to solve the packet ...
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ...
Secure Fog-assisted Sharing for Multimedia Health Records in the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In recent years, multimedia has been widely used in the medical and health fields and plays a pivotal role in personal health records (PHR). In the PHR system, people can easily access to their PHR data, which is mainly ...
Autonomous and Privacy-preserving Energy Trading Based on Redactable Blockchain in Smart Grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of information and communication technologies in smart grid, peer-to-peer (P2P) energy trading for distributed energy resources (DER) has achieved an efficient two-way flow of information and power. ...
An Electric Vehicle Charging Reservation Approach Based on Blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The popularity of electric vehicles depends on convenient and efficient charging services. At present, none of existing charging services allow users to reach charging stations at desirable time and charge immediately when ...