2022
DOI: 10.1109/tifs.2022.3196271
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…The puncturable encryption (PE) approach was included in the attribute‐based matchmaking encryption (AB‐ME) method to create the novel authentication approach named fine‐grained puncturable matchmaking encryption (FP‐ME) was described by Sun et al 63 Implementing the introduced model assures the validity of the clients' requests, and fulfilling their deadlines was devised instantly using the encryption technique. Delivering a user request within the specified deadline in the authenticated format through the newly designed encryption criteria assures the privacy preservation of a fog computing environment.…”
Section: Techniques To Overcome the Security Issues Of Fogmentioning
confidence: 99%
See 2 more Smart Citations
“…The puncturable encryption (PE) approach was included in the attribute‐based matchmaking encryption (AB‐ME) method to create the novel authentication approach named fine‐grained puncturable matchmaking encryption (FP‐ME) was described by Sun et al 63 Implementing the introduced model assures the validity of the clients' requests, and fulfilling their deadlines was devised instantly using the encryption technique. Delivering a user request within the specified deadline in the authenticated format through the newly designed encryption criteria assures the privacy preservation of a fog computing environment.…”
Section: Techniques To Overcome the Security Issues Of Fogmentioning
confidence: 99%
“…Intrusion detection systems : Various attacks in the fog layer are man‐in‐the‐middle attacks, insider attacks, dos attacks, scanning attacks and so on, in which secure information sharing by mitigating the attack is a challenging task. However, security in all the three‐tier architecture is essential for safer information sharing 60–69 …”
Section: Challenges Identifiedmentioning
confidence: 99%
See 1 more Smart Citation
“…What is more, users can update their keys themselves without the need for the trusted center to reissue a new key. There are some recent works related to PE still emerging [27][28][29][30].…”
Section: Related Workmentioning
confidence: 99%
“…With the deep integration and application of artificial intelligence in different industries [ 1 , 2 , 3 ] and social life [ 4 , 5 , 6 ], model training needs more participants. In this paper, we discuss how to motivate participants to provide their multi−dimensional information, such as data [ 7 , 8 ] and computing power.…”
Section: Introductionmentioning
confidence: 99%