References
- Postscapes, Best Internet of Things Definition (2015), http://postscapes.com/internet-of-things-definition.
- P. Mell and T. Grace, "The NIST Definition of Cloud Computing," NIST Special Publication, 800-145, 2011.
- F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the internet of things," MCC Wksp. Mob. Cloud Comput., pp. 13-16, Helsinki, Finland, Aug. 2012.
- I. Dacosta, M. Ahamad, and P. Traynor, "Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties," ESORICS 2012, Pisa, Italy, Sept. 2012.
- N. Karapanos and S. Capkun, "On the effective prevention of TLS man-in-the-middle attacks in web applications," USENIX Security Symp. 2014, San Diego, CA, Aug. 2014.
- P. Hoffman and J. Schlyter, The dns-based authentication of named entities (DANE) transport layer security (TLS) Protocol: TLSA, RFC 6698 (2012), https://www.rfc-editor.org/rfc/rfc6698.txt.
- D. K. Smetters, D. Balfanz, P. Stewart, and H. C. Wong, "Talking to strangers: authentication in Ad-Hoc wireless networks," NDSS 2002, San Diego, CA, Feb. 2002.
- T. Dierks, The transport layer security (TLS) protocol version 1.2, RFC 5246 (2008), https://www.ietf.org/rfc/rfc5246.txt.
- C. Modi, et al., "A survey of intrusion detection techniques in cloud," J. Netw. and Comput. Appl., vol. 36, no. 1, pp. 42-57. Jan. 2013. https://doi.org/10.1016/j.jnca.2012.05.003
- S. Mun, M. Kim, and T. Kwon, "Lightweight cryptographic technology trends for IoT communication environment" J. KICS, vol. 33, no. 3, pp. 80-86, Mar. 2016.
- S. Halevi, et al., "Proofs of ownership in remote storage systems," 18th ACM Conf. Comput. and Commun. Security, pp. 491-500, Oct. 2011.
- F. Armknecht, et al., "Mirror: Enabling proofs of data replication and retrievability in the cloud," USENIX Security Symp. 2016, Austin, Texas, Aug. 2016.
- M. Etemad and A. Kupcu, "Generic efficient dynamic proofs of retrievability," in Proc. 2016 ACM on Cloud Computing Security Workshop, ACM, 2016.
- Q. Zheng and S. Xu, "Secure and efficient proof of storage with deduplication," in Proc. 2nd ACM Conf. Data and Appl. Security and Privacy, pp. 1-12, San Antonio, Texas, USA, Feb. 2012.
- K. M. Ramokapane, A. Rashid, J. M. Such, "Assured deletion in the cloud: requirements, challenges and future directions," in Proc. 2016 ACM on Cloud Comput. Security Wksp., pp. 97-108, Vienna, Austria, Oct. 2016.
- JR. Douceur, et al., "Reclaiming space from duplicate files in a serverless distributed file system," IEEE Distrib. Comput. Syst., pp 617-624, 2002.
- S. Keelveedhi, M. Bellare, and T. Ristenpart. "DupLESS: server-aided encryption for deduplicated storage," USENIX Security 13, 2013.
- P. Puzio, et al., "ClouDedup: secure deduplication with encrypted data for cloud storage," IEEE CloudCom, vol. 1, 2013.
- S. M. Bellovin and M. Merritt, "Encrypted key exchange: Password-based protocols secure against dictionary attacks," 1992 IEEE Comput. Soc. Symp. Security and Privacy, May 1992.
- B. Parno, et al., "Pinocchio: Nearly practical verifiable computation", 2013 IEEE Symp. Security and Privacy, 2013.
- C. Gentry, "A fully homomorphic encryption scheme," Ph.D dissertation, Stanford Univ., 2009.
- D. Boneh, A. Sahai, and B. Waters, "Functional encryption: Definitions and challenges," Theory of Cryptography Conf. vol. 6597, pp. 253-273, 2011.
- DX. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. 2000 IEEE Symp. Security and Privacy, pp. 44-55, 2000.
- R. Lu, et al., "Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications," IEEE Trans. Parall. and Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, 2012. https://doi.org/10.1109/TPDS.2012.86
- B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Trans. Mob. Comput. vol. 7, no. 1, pp. 1-18, 2008. https://doi.org/10.1109/TMC.2007.1062
- X. Liu, et al., "Traffic-aware multiple mix zone placement for protecting location privacy," IEEE INFOCOM, pp. 972-980, 2012.
- M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proc. 1st Int. Conf. Mob. Syst. Appl. and Serv., pp. 31-42, San Francisco, California, May 2003.
- V. Bindschaedler and R. Shokri, "Synthesizing plausible privacy-preserving location traces," IEEE Symp. Security and Privacy, May 2016.
- B. Niu, et al., "Protection of location privacy in continuous LBSs against adversaries with background information," IEEE ICNC, pp. 1-6, 2016.
- H. Wang, et al., "Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control," IEEE ICDCS'08, pp. 1-6, 2008.
- B. Jiang and X. Hu, "A survey of group key management," IEEE Comput. Sci. and Softw. Eng. 2008, vol. 3, pp. 994-1002, 2008.
- S. J. Moon, V. Sekar, and M. K. Reiter, "Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration," in Proc. 22nd ACM SIGSAC Conf. Comput. and Commun. Security, pp. 1595-1606, Denver, United States, 2015.
- Z. Zhou, M. K. Reiter, and Y. Zhang, "A software approach to defeating side channels in last-level caches", arXiv preprint arXiv: 1603.05615, 2016.
- Y. Kim and S. Lee, "Analysis and comprehension of cloud computing," J. KICS, vol. 32, no. 4, pp. 87-92, Mar. 2015.
- D. Kim, S. Yun, and Y. Lee, "Security for IoT service," J. KICS, vol. 30, no. 8, pp. 53-59, Jul. 2013.
- G. Irazoqui, T. Eisenbarth, and B. Sunar, "S $ A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES," 2015 IEEE Symp. Security and Privacy, pp 591-604, May 2015.
- Y. Yarom and K. Falkner, "Flush+ reload: a high resolution, low noise, L3 cache side-channel attack," 23rd USENIX Security Symp., pp. 719-732, San Diego, CA, Aug. 2014.
Cited by
- A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment pp.1572-834X, 2019, https://doi.org/10.1007/s11277-018-6083-9
- A Blockchain-Based Trusted Edge Platform in Edge Computing Environment vol.21, pp.6, 2021, https://doi.org/10.3390/s21062126