2024
DOI: 10.1109/tem.2022.3159311
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Enabled Privacy-Preserving Authentication Mechanism for Transportation CPS With Cloud-Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…However, with the increasing number of IoT devices, there are more and more computing tasks requiring central support. Cloud computing centers are far away from devices [6] and the transmission distance of tasks in the network is long, with high latency, making it difficult to meet user needs. Due to its deployment methods, distance, energy consumption, and other drawbacks, the use of cloud computing in industry is limited.…”
Section: Introductionmentioning
confidence: 99%
“…However, with the increasing number of IoT devices, there are more and more computing tasks requiring central support. Cloud computing centers are far away from devices [6] and the transmission distance of tasks in the network is long, with high latency, making it difficult to meet user needs. Due to its deployment methods, distance, energy consumption, and other drawbacks, the use of cloud computing in industry is limited.…”
Section: Introductionmentioning
confidence: 99%
“…Li et al [23] tried to add cryptocurrencies to PDP scheme to promote TPA to be more active. And work [24] made some fine attempts in cloud-edge computation scenario. These works proved that blockchain-based PDP is practical, but lacked a full-featured solution to solve the problem of group data auditing.…”
Section: Introductionmentioning
confidence: 99%
“…Research for IoT security has been incessant, some focus on improving the reading speed of data in the cloud, such as Hu Xiong et al 8 use CDN networks to distribute data in the cloud in order to speed up the efficiency of reading data from IoT devices; Chien‐Ming Chen et al 9 start from the direction of encrypted search, which allows users to retrieve data efficiently in a huge amount of encrypted data, thereby increasing the speed of data access. Mei et al 10 have increased the reliability of communication by using combining blockchain with the Internet of Things to provide authentication services for vehicles in the Internet of Vehicles. In addition to this, there are also studies to secure the IoT from the encryption perspective 11‐14 …”
Section: Introductionmentioning
confidence: 99%