You are currently on the new version of our website. Access the old version .

393 Results Found

  • Article
  • Open Access
431 Views
23 Pages

Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information. Homomorphic encryption allows computations on encr...

  • Article
  • Open Access
2 Citations
4,803 Views
25 Pages

Secure Multiparty Computation Using Secure Virtual Machines

  • Danko Miladinović,
  • Adrian Milaković,
  • Maja Vukasović,
  • Žarko Stanisavljević and
  • Pavle Vuletić

The development of new processor capabilities which enable hardware-based memory encryption, capable of isolating and encrypting application code and data in memory, have led to the rise of confidential computing techniques that protect data when pro...

  • Article
  • Open Access
1 Citations
2,943 Views
23 Pages

Confidential Kubernetes Deployment Models: Architecture, Security, and Performance Trade-Offs

  • Eduardo Falcão,
  • Fernando Silva,
  • Carlos Pamplona,
  • Anderson Melo,
  • A S M Asadujjaman and
  • Andrey Brito

17 September 2025

Cloud computing brings numerous advantages that can be leveraged through containerized workloads to deliver agile, dependable, and cost-effective microservices. However, the security of such cloud-based services depends on the assumption of trusting...

  • Article
  • Open Access
9 Citations
5,730 Views
13 Pages

This study proposes a blockchain-based system that utilizes fully homomorphic encryption to provide data security and statistical privacy when data are shared with third parties for analysis or research purposes. The proposed system not only provides...

  • Review
  • Open Access
13 Citations
9,086 Views
24 Pages

Privacy-Preserving Blockchain Technologies

  • Dalton Cézane Gomes Valadares,
  • Angelo Perkusich,
  • Aldenor Falcão Martins,
  • Mohammed B. Alshawki and
  • Chris Seline

14 August 2023

The main characteristics of blockchains, such as security and traceability, have enabled their use in many distinct scenarios, such as the rise of new cryptocurrencies and decentralized applications (dApps). However, part of the information exchanged...

  • Article
  • Open Access
1 Citations
4,138 Views
35 Pages

25 October 2025

RISC-V has emerged as a compelling alternative to proprietary instruction set architectures, distinguished by its openness, extensibility, and modularity. As the ecosystem matures, attention has turned to building confidential computing foundations,...

  • Article
  • Open Access
32 Citations
5,538 Views
19 Pages

5 November 2018

Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices....

  • Article
  • Open Access
5 Citations
2,997 Views
28 Pages

Presenting the COGNIFOG Framework: Architecture, Building Blocks and Road toward Cognitive Connectivity

  • Toni Adame,
  • Emna Amri,
  • Grigoris Antonopoulos,
  • Selma Azaiez,
  • Alexandre Berne,
  • Juan Sebastian Camargo,
  • Harry Kakoulidis,
  • Sofia Kleisarchaki,
  • Alberto Llamedo and
  • Klym Shumaiev
  • + 2 authors

15 August 2024

In the era of ubiquitous computing, the challenges imposed by the increasing demand for real-time data processing, security, and energy efficiency call for innovative solutions. The emergence of fog computing has provided a promising paradigm to addr...

  • Article
  • Open Access
6 Citations
3,994 Views
36 Pages

Cloud Security Using Fine-Grained Efficient Information Flow Tracking

  • Fahad Alqahtani,
  • Mohammed Almutairi and
  • Frederick T. Sheldon

25 March 2024

This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhe...

  • Article
  • Open Access
13 Citations
3,964 Views
21 Pages

24 January 2022

The Internet of Things (IoT) allows billions of physical objects to be connected to gather and exchange information to offer numerous applications. It has unsupported features such as low latency, location awareness, and geographic distribution that...

  • Article
  • Open Access
2 Citations
5,490 Views
15 Pages

With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect confid...

  • Article
  • Open Access
3 Citations
2,310 Views
26 Pages

Identity-Based Matchmaking Encryption with Equality Test

  • Zhen Yan,
  • Xijun Lin,
  • Xiaoshuai Zhang,
  • Jianliang Xu and
  • Haipeng Qu

15 January 2024

The identity-based encryption with equality test (IBEET) has become a hot research topic in cloud computing as it provides an equality test for ciphertexts generated under different identities while preserving the confidentiality. Subsequently, for t...

  • Article
  • Open Access
5 Citations
5,920 Views
17 Pages

Hamming Code Strategy for Medical Image Sharing

  • Li Li,
  • Ching-Chun Chang,
  • Junlan Bai,
  • Hai-Duong Le,
  • Chi-Cheng Chen and
  • Teen-Hang Meen

In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryp...

  • Article
  • Open Access
24 Citations
12,677 Views
15 Pages

A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security

  • Ahmed EL-YAHYAOUI and
  • Mohamed Dafir ECH-CHERIF EL KETTANI

Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive d...

  • Article
  • Open Access
3 Citations
3,306 Views
16 Pages

Securing Publisher–Subscriber Smart Grid Infrastructure

  • Fraser Orr,
  • Muhammad Nouman Nafees,
  • Neetesh Saxena and
  • Bong Jun Choi

27 September 2021

The security of communication protocols in the smart grid system is a crucial concern. An adversary can exploit the lack of confidentiality and authentication mechanism to cause damaging consequences. In the substation automation systems that rely on...

  • Article
  • Open Access
23 Citations
4,755 Views
20 Pages

Big Data Handling Approach for Unauthorized Cloud Computing Access

  • Abdul Razaque,
  • Nazerke Shaldanbayeva,
  • Bandar Alotaibi,
  • Munif Alotaibi,
  • Akhmetov Murat and
  • Aziz Alotaibi

Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confiden...

  • Article
  • Open Access
54 Citations
11,279 Views
28 Pages

17 September 2012

Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring...

  • Article
  • Open Access
1 Citations
1,415 Views
22 Pages

A Privacy-Preserving Scheme for a Traffic Accident Risk Level Prediction System

  • Pablo Marcillo,
  • Gabriela Suntaxi and
  • Myriam Hernández-Álvarez

29 October 2024

Due to the expansion of Artificial Intelligence (AI), especially Machine Learning (ML), it is more common to face confidentiality regulations about using sensitive data in learning models generally hosted in cloud environments. Confidentiality regula...

  • Article
  • Open Access
519 Views
29 Pages

17 November 2025

In federated learning, secure aggregation is essential to protect the confidentiality of local model updates, ensuring that the server can access only the aggregated result without exposing individual contributions. However, conventional secure aggre...

  • Review
  • Open Access
3 Citations
2,692 Views
29 Pages

Survey on Secure Scientific Workflow Scheduling in Cloud Environments

  • Hadeel Amjed Saeed,
  • Sufyan T. Faraj Al-Janabi,
  • Esam Taha Yassen and
  • Omar A. Aldhaibani

21 January 2025

In cloud computing environments, the representation and management of data through workflows are crucial to ensuring efficient processing. This paper focuses on securing scientific workflow scheduling, which involves executing complex data-processing...

  • Article
  • Open Access
7 Citations
4,011 Views
27 Pages

22 September 2019

User activity logs are important pieces of evidence in digital forensic investigations. In cloud forensics, it is difficult to collect user activity logs due to the fact of virtualization technologies and the multitenancy environment, which can infri...

  • Article
  • Open Access
40 Citations
5,770 Views
38 Pages

17 May 2018

Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of...

  • Feature Paper
  • Article
  • Open Access
1,644 Views
23 Pages

Harvest-Now, Decrypt-Later: A Temporal Cybersecurity Risk in the Quantum Transition

  • Francis Kagai,
  • Philip Branch,
  • Jason But and
  • Rebecca Allen

18 December 2025

Telecommunication infrastructures rely on cryptographic protocols designed for long-term confidentiality, yet data exchanged today faces future exposure when adversaries acquire quantum or large-scale computational capabilities. This harvest-now, dec...

  • Article
  • Open Access
42 Citations
8,156 Views
20 Pages

A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain

  • Kwame Opuni-Boachie Obour Agyekum,
  • Qi Xia,
  • Emmanuel Boateng Sifah,
  • Jianbin Gao,
  • Hu Xia,
  • Xiaojiang Du and
  • Moshen Guizani

11 March 2019

Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy iss...

  • Article
  • Open Access
4 Citations
3,214 Views
25 Pages

Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption

  • Haihe Ba,
  • Huaizhe Zhou,
  • Songzhu Mei,
  • Huidong Qiao,
  • Tie Hong,
  • Zhiying Wang and
  • Jiangchun Ren

21 September 2018

Cloud computing emerges as a change in the business paradigm that offers pay-as-you-go computing capability and brings enormous benefits, but there are numerous organizations showing hesitation for the adoption of cloud computing due to security conc...

  • Review
  • Open Access
894 Views
16 Pages

7 November 2025

Cyber defense has evolved into an algorithmically intensive discipline where mathematical rigor and adaptive computation underpin the robustness and continuity of digital infrastructures. This review consolidates the algorithmic spectrum that support...

  • Article
  • Open Access
469 Views
43 Pages

Secure DNA Cryptosystem for Data Protection in Cloud Storage and Retrieval

  • Thangavel Murugan,
  • Varalakshmi Perumal and
  • Nasurudeen Ahamed Noor Mohamed Badusha

10 December 2025

In today’s digital era, real-time applications rely heavily on cloud environments for computation, storage, and data retrieval. Data owners outsource sensitive information to cloud storage servers managed by service providers such as Google and...

  • Article
  • Open Access
10 Citations
4,763 Views
12 Pages

Model of Threats to Computer Network Software

  • Aleksey Novokhrestov,
  • Anton Konev and
  • Alexander Shelupanov

11 December 2019

This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to iden...

  • Article
  • Open Access
2 Citations
1,790 Views
18 Pages

23 November 2023

The certificateless online/offline aggregate signcryption scheme combines the characteristics of the certificateless aggregate signcryption scheme and the online/offline encryption scheme, which can increase efficiency while simultaneously reducing c...

  • Feature Paper
  • Article
  • Open Access
7 Citations
5,060 Views
15 Pages

In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured...

  • Article
  • Open Access
144 Views
17 Pages

19 January 2026

To address the issues of insufficient privacy protection, lack of confidentiality, and absence of traceability mechanisms in resource-constrained application scenarios such as IoT nodes or mobile network group communications, this paper proposes a tr...

  • Article
  • Open Access
1,483 Views
22 Pages

Many research studies have designed intelligent traffic light scheduling algorithms. Some researchers rely on specialized sensors and hardware to gather real-time traffic data at signalized road intersections. Others benefit from artificial intellige...

  • Article
  • Open Access
28 Citations
7,136 Views
28 Pages

Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics

  • Amna Shifa,
  • Mamoona Naveed Asghar,
  • Salma Noor,
  • Neelam Gohar and
  • Martin Fleury

11 March 2019

Within an Internet of Multimedia Things, the risk of disclosing streamed video content, such as that arising from video surveillance, is of heightened concern. This leads to the encryption of that content. To reduce the overhead and the lack of flexi...

  • Article
  • Open Access
23 Citations
3,528 Views
15 Pages

1 August 2019

Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure commun...

  • Article
  • Open Access
7 Citations
2,974 Views
19 Pages

Towards Mobile Federated Learning with Unreliable Participants and Selective Aggregation

  • Leonardo Esteves,
  • David Portugal,
  • Paulo Peixoto and
  • Gabriel Falcao

28 February 2023

Recent advances in artificial intelligence algorithms are leveraging massive amounts of data to optimize, refine, and improve existing solutions in critical areas such as healthcare, autonomous vehicles, robotics, social media, or human resources. Th...

  • Article
  • Open Access
3 Citations
4,636 Views
16 Pages

30 November 2023

In the era of big data, it is essential to securely and efficiently combine the large amounts of private data owned by different companies or organizations to make correct decisions. Secure Multiparty Computation (SMPC) works as a general cryptograph...

  • Article
  • Open Access
7 Citations
4,636 Views
20 Pages

iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography

  • Hisham Almajed,
  • Ahmad Almogren and
  • Mohammed Alabdulkareem

30 November 2020

Recently, many platforms have outsourced tasks to numerous smartphone devices known as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the platform for further analysis and processing. These data needs to maintain confide...

  • Article
  • Open Access
14 Citations
6,456 Views
12 Pages

Privacy-Preserving Data Sharing in Telehealth Services

  • Ammar Odeh,
  • Eman Abdelfattah and
  • Walid Salameh

22 November 2024

In today’s healthcare industry, safeguarding patient data is critical due to the increasing digitization of medical records, which makes them vulnerable to cyber threats. Telehealth services, while providing immense benefits in terms of accessi...

  • Article
  • Open Access
2 Citations
774 Views
21 Pages

24 July 2025

Smart healthcare establishes a safe, reliable, and efficient medical information system for the public with the help of the Internet of Things, cloud storage, and other Internet technologies. To enable secure data sharing and case-matching functions...

  • Article
  • Open Access
1 Citations
7,944 Views
25 Pages

In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse r...

  • Article
  • Open Access
16 Citations
1,523 Views
15 Pages

30 December 2023

Safeguarding the data collected by smart meters is essential because the disclosure of this information may threaten the privacy of the consumer. By obtaining them, hackers can find out the behavior of the person and use that information for maliciou...

  • Article
  • Open Access
33 Citations
7,353 Views
27 Pages

RAMi: A New Real-Time Internet of Medical Things Architecture for Elderly Patient Monitoring

  • Olivier Debauche,
  • Jean Bertin Nkamla Penka,
  • Saïd Mahmoudi,
  • Xavier Lessage,
  • Moad Hani,
  • Pierre Manneback,
  • Uriel Kanku Lufuluabu,
  • Nicolas Bert,
  • Dounia Messaoudi and
  • Adriano Guttadauria

7 September 2022

The aging of the world’s population, the willingness of elderly to remain independent, and the recent COVID-19 pandemic have demonstrated the urgent need for home-based diagnostic and patient monitoring systems to reduce the financial and organ...

  • Article
  • Open Access
3 Citations
7,457 Views
15 Pages

Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms ineffic...

  • Article
  • Open Access
22 Citations
6,611 Views
26 Pages

16 October 2015

In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a message securely and efficiently, as the message is well encrypted and only one ciphertext corresponding to the message is generated no matter how...

  • Proceeding Paper
  • Open Access
9 Citations
2,257 Views
10 Pages

A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain

  • Lakshman Kannan Venugopal,
  • Rajappan Rajaganapathi,
  • Abhishek Birjepatil,
  • Sundararajan Edwin Raja and
  • Gnanasaravanan Subramaniam

22 December 2023

The Blockchain-based information security framework for health care big data environments is a framework designed for the secure storage, access, and transmission of health care data in big data environments. It combines the privacy and security adva...

  • Article
  • Open Access
4 Citations
1,866 Views
23 Pages

Language-Based Opacity Verification in Partially Observed Petri Nets through Linear Constraints

  • Ikram Saadaoui,
  • Abdeldjalil Labed,
  • Zhiwu Li,
  • Ahmed M. El-Sherbeeny and
  • Huiran Du

11 September 2023

Information security is an important area of concern in modern computer-integrated systems. It involves implementing preventative measures to protect confidential data from potential vulnerabilities, such as unauthorized access, secret disclosure, mo...

  • Article
  • Open Access
3,983 Views
19 Pages

Privacy-Aware MapReduce Based Multi-Party Secure Skyline Computation

  • Saleh Ahmed,
  • Mahboob Qaosar,
  • Asif Zaman,
  • Md. Anisuzzaman Siddique,
  • Chen Li,
  • Kazi Md. Rokibul Alam and
  • Yasuhiko Morimoto

Selecting representative objects from a large-scale dataset is an important task for understanding the dataset. Skyline is a popular technique for selecting representative objects from a large dataset. It is obvious that the skyline computation from...

  • Article
  • Open Access
31 Citations
5,437 Views
16 Pages

A Novel Provable Secured Signcryption Scheme PSSS: A Hyper-Elliptic Curve-Based Approach

  • Insaf Ullah,
  • Noor Ul Amin,
  • Junaid Khan,
  • Muhammad Rehan,
  • Muhammad Naeem,
  • Hizbullah Khattak,
  • Shah Jahan Khattak and
  • Haseen Ali

31 July 2019

Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher computation and communication costs due to increased sizes of parameters, publi...

  • Article
  • Open Access
8 Citations
6,911 Views
15 Pages

Electromagnetic Safety of Remote Communication Devices—Videoconference

  • Artur Przybysz,
  • Krystian Grzesiak and
  • Ireneusz Kubiak

16 February 2021

Devices powered by electricity become sources of electromagnetic emissions in the course of their operation. In the case of devices oriented to process information, these emissions can have a character of revealing emissions, i.e., those whose recept...

  • Article
  • Open Access
24 Citations
4,057 Views
17 Pages

Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks

  • Mukesh Kumar,
  • Monika Sethi,
  • Shalli Rani,
  • Dipak Kumar Sah,
  • Salman A. AlQahtani and
  • Mabrook S. Al-Rakhami

6 July 2023

By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, aut...

of 8