2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) 2016
DOI: 10.1109/cloudcom.2016.0054
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Thus, it's a difficult task to implement privacy-preserving techniques between the Fog and IoT devices. However, it is significant because the users of IoT devices may be concerned about their data which is sensitive [77]. Different privacy preservation techniques, methods, and schemes are proposed across many scenarios, including cloud [78], wireless network [79], smart grid [80], health-care systems [81], and online social networks [82].…”
Section: Privacy Preservationmentioning
confidence: 99%
“…Thus, it's a difficult task to implement privacy-preserving techniques between the Fog and IoT devices. However, it is significant because the users of IoT devices may be concerned about their data which is sensitive [77]. Different privacy preservation techniques, methods, and schemes are proposed across many scenarios, including cloud [78], wireless network [79], smart grid [80], health-care systems [81], and online social networks [82].…”
Section: Privacy Preservationmentioning
confidence: 99%
“…In this context, Koo et al has presented a mixed secure paradigm that eliminates duplication by considering false fog saving and reserving scenarios [106]. For safeguarding of privacy, this work interjects a trusted third party (TPP) in the operation [107].…”
Section: Trust Middleware and Specimenmentioning
confidence: 99%
“…It can manage problematic system associations and accomplish safety setups befitting various application requirements. In their work, Wang et al suggest a plan to safeguard the identities of edge gadgets through the use of aliases and to ensure information concealment using a similar in form encryption method while transferring information from edge gadgets to the cloud [106].…”
Section: Safe Communicationmentioning
confidence: 99%
“…One of the most prominent and well-known technologies in this industry is machine learning. Machine learning was first established as a sub-domain of artificial intelligence by Arthur Samuel in 1959 [1,2]. Succeeding that, machine learning tactics became broadly employed in a variety of fields, and it is now recognised as one of the most important and rapidly evolving technologies, particularly for addressing issues such as future event prediction, disease diagnosis, market analysis, email filtering, intrusion detection, image and speech recognition, and so on [3].…”
Section: Introductionmentioning
confidence: 99%