2018
DOI: 10.1109/cc.2018.8543057
|View full text |Cite
|
Sign up to set email alerts
|

A key management scheme based on hypergraph for fog computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Furthermore, the privacy-preserving techniques must have several means to validate the communications created within the Cloud network, as well as a variety of key functions to assure maximum privacy. 57 To establish which kinds of attacks put Cloud storage in jeopardy and which types of attacks the technique can counter, privacy issues must be thoroughly investigated. The test environment should be flexible and consistent with the established technique, such as the use of suitable hardware and software, adequate programming language expertise, and selection of the right Cloud server.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, the privacy-preserving techniques must have several means to validate the communications created within the Cloud network, as well as a variety of key functions to assure maximum privacy. 57 To establish which kinds of attacks put Cloud storage in jeopardy and which types of attacks the technique can counter, privacy issues must be thoroughly investigated. The test environment should be flexible and consistent with the established technique, such as the use of suitable hardware and software, adequate programming language expertise, and selection of the right Cloud server.…”
Section: Discussionmentioning
confidence: 99%
“…Random and big keys, on the other hand, may take a long time to analyze and decrypt, but they can provide good protection of data. Furthermore, the privacy‐preserving techniques must have several means to validate the communications created within the Cloud network, as well as a variety of key functions to assure maximum privacy 57 …”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many experts and scholars have carried out research on the architecture of fog computing [39]. Existing fog computing architecture research can generally be divided into two categories: cloud-fog-terminal three-level architecture and fog-terminal two-level architecture [40]. The former consists of a cloud layer, a fog layer and a terminal layer.…”
Section: The Architecture Of Vehicular Fog Computingmentioning
confidence: 99%
“…Furthermore, our proposal can prevent collusion attacks, ensure forward/backward security. However, Scheme [55] and Scheme [54] only protect forward/backward security. Although GKMSFC and Scheme [45,46] have the same computational cost, GKMSFC has less network load and message costs.…”
Section: Rekeying Efficiencymentioning
confidence: 99%