2020
DOI: 10.1109/access.2020.3038825
|View full text |Cite
|
Sign up to set email alerts
|

A New Method With Swapping of Peers and Fogs to Protect User Privacy in IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 26 publications
(5 citation statements)
references
References 55 publications
0
5
0
Order By: Relevance
“…In this section, we compare the proposed work with the four most common and basic approaches to privacy and security: Dummy enhance-CaDSA [31], obfuscation (DOA) [30], BTP [33], and collaboration (SPF) [37]. We selected a recent scientific paper for each approach.…”
Section: Simulation and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we compare the proposed work with the four most common and basic approaches to privacy and security: Dummy enhance-CaDSA [31], obfuscation (DOA) [30], BTP [33], and collaboration (SPF) [37]. We selected a recent scientific paper for each approach.…”
Section: Simulation and Resultsmentioning
confidence: 99%
“…Hybrid approach [37]: many methods can be combined to create a new approach with a higher level of privacy protection, but these approaches will not be valid in dealing with health services based on location. This is because they do not modify the mechanism of the main integrated methods, which are not suitable for health services, as we mentioned before.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Sustainability In this work, authors provided validation details for different components and features for extending the framework for different application settings [ 3 ] Yamin, M., Ahmed Abi Sen, A., Mahmoud AlKubaisy, Z. and Almarzouki, R. (2021) https://doi.org/10.32604/cmc.2021.017433 A Novel Technique for Early Detection of COVID-19 An automatic early detection technique for COVID-19 detection based on CT images and a deep neural architecture called the AIRRCNN was reported, and a detection performance of 99% was achieved [ 4 ] Abdi, A.I., Eassa, F.E., Jambi, K., Almarhabi, K., Khemakhem, M., Basuhail, A. and Yamin, M. (2022) https://doi.org/10.3390/electronics11050711 Hierarchical Blockchain-Based Multi-Chain code Access Control for Securing IoT Systems In this work, the authors developed a light-weight hierarchical blockchain-based multi-chain code access control to protect the security and privacy of IoT systems, and some of the key findings include, enhanced scalability of the system based on a novel clustering concept based on block chain managers [ 5 ] Basahel, S., Alsabban, A. and Yamin, M. (2021) https://doi.org/10.1007/s41870-021-00812-w Hajj and Umrah management during COVID-19. International Journal of Information Technology This work provided a detailed review of several crowded events which have taken place during the COVID-19 pandemic, with an in-depth investigation of the impact of pandemic done, and a framework was developed for effectively organizing crowded events during similar emergency and disaster scenarios [ 6 ] Yamin, M. and Abi Sen, A.A. (2020) https://doi.org/10.1109/access.2020.3038825 A New Method with Swapping of Peers and Fogs to Protect User Privacy in IoT Applications In this work, the authors provided a new method to protect users’ privacy in IoT systems], based on a technique known as the Swapping of Peers and Fogs (SPF), and by exploiting the features of fogs and smart dummies. Some of the key findings from this work include, remarkable improvement offered by SPF approach towards the level of protection of users’ identity [ 7 ] Yamin, M., Alsaawy, Y., B. Alkhodre, A. and Abi Sen, A.A. (2019 https://doi.org/10.3390/s19153355 An Innovative Method for Preserving Privacy in Internet of Things.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Therefore, in the information age, while enjoying the convenience brought by all kinds of intelligent software, the problem of personal data privacy disclosure is fundamentally unavoidable. However, users' personal privacy can be protected to a certain extent through privacy protection technology [15] [9] [3]. Moreover, in the follow-up recommendation, the website mostly makes matching recommendation according to the desired position and professional skills filled in by job seekers.…”
Section: Introductionmentioning
confidence: 99%