2017 IEEE Trustcom/BigDataSE/Icess 2017
DOI: 10.1109/trustcom/bigdatase/icess.2017.236
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…Such transaction outputs are inherently unspendable, and thus they are not included in the UTXO set. Consequently, block-pruning schemes, such as CoinPrune, would remove this data and thereby break higherlevel applications, e.g.,, audit systems [2]- [4].…”
Section: B Preservation Of Application-level Datamentioning
confidence: 99%
See 2 more Smart Citations
“…Such transaction outputs are inherently unspendable, and thus they are not included in the UTXO set. Consequently, block-pruning schemes, such as CoinPrune, would remove this data and thereby break higherlevel applications, e.g.,, audit systems [2]- [4].…”
Section: B Preservation Of Application-level Datamentioning
confidence: 99%
“…Using the blockchain, all nodes can independently verify the transaction history, allowing mutually distrusting peers to establish consensus about the correctness of those transactions. This consensus also enables, for instance, audit systems [2]- [4], transparency overlays [5], [6], bootstrapping anonymity services [7], and smart contracts [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Different attacks that may breach location and identity protection can be seen on IoT's delay-tolerant networking (DTL) or cloud-based system. Likewise, an IoT deployment-based malicious cloud service provider may access sensitive information transmitted to the appropriate destination [59], [60], [61].…”
Section: End-to-end Transportation Safetymentioning
confidence: 99%
“…This raises the worries about the security and protection of the IoTs [12,13,14]. The answer for security and protection issues is to incorporate security highlights, for example, gadget identification, gadget/client verification and information encryption [15,16,17]. These security capacities are regularly considering the cryptographic calculations, including open key cryptography and symmetric cryptography, which involve handling force and increment power and vitality utilization [18,19].…”
Section: Introductionmentioning
confidence: 99%