Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleJuly 2024
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
- Hang Thanh Bui,
- Hamed Aboutorab,
- Arash Mahboubi,
- Yansong Gao,
- Nazatul Haque Sultan,
- Aufeef Chauhan,
- Mohammad Zavid Parvez,
- Michael Bewong,
- Rafiqul Islam,
- Zahid Islam,
- Seyit A. Camtepe,
- Praveen Gauravaram,
- Dineshkumar Singh,
- M. Ali Babar,
- Shihao Yan
AbstractThe digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming technologies and infrastructure, the agricultural sector ...
Highlights- Conducts a systematic literature review for cyber threat intelligence (CTI).
- Compares techniques in unstructured/structured sources for robust cybersecurity.
- Analyses techniques aligned with Agriculture 4.0's Smart Farming ...
- research-articleJuly 2024
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme
- Nazatul H. Sultan,
- Shabnam K. Kermanshahi,
- Hong Y. Tran,
- Shangqi Lai,
- Vijay Varadharajan,
- Surya Nepal,
- Xun Yi
AbstractThe rapid progress in the field of IoT and its wide-ranging applications emphasize the criticality of robust security measures for effectively sharing, storing, and managing sensitive data generated by IoT devices. Regulations such as the ...
Highlights- Proposed a novel keyword search scheme using lightweight cryptographic primitives for IoT.
- Enable multi-client data sharing settings, letting IoT owners authorize multiple clients.
- Support a dynamic storage environment permitting ...
- ArticleSeptember 2020
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation
AbstractThis paper presents a novel encryption-based access control scheme to address the access control issues in Named Data Networking (NDN). Though there have been several recent works proposing access control schemes, they are not suitable for many ...
- research-articleJuly 2019
Cloud Data Provenance using IPFS and Blockchain Technology
SCC '19: Proceedings of the Seventh International Workshop on Security in Cloud ComputingPages 5–12https://doi.org/10.1145/3327962.3331457Cloud is widely used for data storage. A user who has uploaded his/her private or commercial data to the cloud is always keen to know whether the data that he/she has stored is secure or not. Access logs of stored data can be used to trace the integrity ...
- research-articleNovember 2018
ICAuth: A secure and scalable owner delegated inter-cloud authorization
Future Generation Computer Systems (FGCS), Volume 88, Issue CPages 319–332https://doi.org/10.1016/j.future.2018.05.066AbstractThis paper proposes a secure inter-cloud authorization scheme using ciphertext-policy attribute-based encryption (CP-ABE). The proposed scheme enables data owners to access files which are stored in cloud storage servers, managed by a ...
Highlights- An inter-cloud authorization scheme is proposed for secure file sharing.
- Data ...
- research-articleOctober 2017
A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control
SIN '17: Proceedings of the 10th International Conference on Security of Information and NetworksPages 11–18https://doi.org/10.1145/3136825.3136877Cloud storage service allows its users to store and share data in a cloud environment. To secure the data from unauthorized entities while sharing, cryptographic mechanisms are used. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one such ...
- ArticleDecember 2014
PAPAR: Pairing Based Authentication Protocol with Anonymous Roaming for Wireless Mesh Networks
ICIT '14: Proceedings of the 2014 International Conference on Information TechnologyPages 155–160https://doi.org/10.1109/ICIT.2014.36In wireless networks, secure authentication protocol should enable a legitimate roaming user to get roaming services from foreign server when he/she is away from home domain. However, a basic authentication protocol requires participation of home server,...