2019
DOI: 10.1109/mprv.2018.2877286
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring Confidentiality in the Cloud of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 17 publications
0
0
0
Order By: Relevance
“…While CoT can create many business opportunities, the privilege of accessing virtual resources and storage capacity in the cloud, as well as the protection of identity, security, and privacy, becomes very important. CoTs are built in public clouds, and IoT devices are often deployed in resource-limited areas, which further complicates the system [30,31]. The BCoT ecosystem can be seen as a blockchain as a service (BaaS) integrated with cloud computing to develop and deploy blockchains for cloud IoT applications.…”
Section: Related Researchmentioning
confidence: 99%
“…While CoT can create many business opportunities, the privilege of accessing virtual resources and storage capacity in the cloud, as well as the protection of identity, security, and privacy, becomes very important. CoTs are built in public clouds, and IoT devices are often deployed in resource-limited areas, which further complicates the system [30,31]. The BCoT ecosystem can be seen as a blockchain as a service (BaaS) integrated with cloud computing to develop and deploy blockchains for cloud IoT applications.…”
Section: Related Researchmentioning
confidence: 99%