Internet of Things 2020
DOI: 10.1201/9781003032441-11
|View full text |Cite
|
Sign up to set email alerts
|

Improved Privacy Preservation Framework for Cloud-Based Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…Furthermore, in the [ 73 ], which also applies HE to the transfer of data from the IoT to cloud servers, and the algorithm acts as outsourced storage and computation for PP in the cloud-IoT model (Q1). Simulation results confirm that data transferred between IoT devices and the cloud is more private than existing methods.…”
Section: Literature Review and Discussionmentioning
confidence: 99%
“…Furthermore, in the [ 73 ], which also applies HE to the transfer of data from the IoT to cloud servers, and the algorithm acts as outsourced storage and computation for PP in the cloud-IoT model (Q1). Simulation results confirm that data transferred between IoT devices and the cloud is more private than existing methods.…”
Section: Literature Review and Discussionmentioning
confidence: 99%
“…The analysis basically deals with classifying weather The question of whether or not a person is eligible for a loan implies that the problem is one of classification, which may be solved using classification techniques [17]- [23]. The present system, CIBIL, is a credit rating system that gathers and retains records of payments made on loans and credit cards by people and businesses.…”
Section: Existing Workmentioning
confidence: 99%
“…While physical "Credit card fraud" is possible, the regularity with which account information is stolen electronically has increased dramatically thanks to modern technologies. Until the card information is used to make transactions, the account holder, the merchant from whom the card information was stolen or intercepted, and even the card issuer may be fully unaware of the breach [26]- [34]. Because of the growing popularity of online shopping and bill payment, having a physical credit card or debit card is no longer required to make transactions or pay bills.…”
Section: "Credit Card Fraud"mentioning
confidence: 99%