2020
DOI: 10.1109/access.2020.2982961
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing

Abstract: Cloud computing has emerged as a promising paradigm for the Internet of Things (IoT) and Cyber-Physical-Social Systems (CPSS). However, the problem of how to ensure the security of data transmission and data storage in CPSS is a key issue to address. We need to protect the confidentiality and privacy of users' data and users' identity during the transmission and storage process in CPSS. In order to avoid users' personal information leakage from IoT devices during the process of data processing and transmitting… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…When errors are found in the data transmission process, the data packet can be tracked by combining the data packet type, source device type, target device type, data packet number, and device unique identification to find out the causes of data abnormalities and realize the self-inspection function of transmission status in the transmission process [ 34 ]. At the same time, defining traceable data packets also facilitates function development and improves the intelligence of smart home control and management.…”
Section: Smart Home Control and Managementmentioning
confidence: 99%
“…When errors are found in the data transmission process, the data packet can be tracked by combining the data packet type, source device type, target device type, data packet number, and device unique identification to find out the causes of data abnormalities and realize the self-inspection function of transmission status in the transmission process [ 34 ]. At the same time, defining traceable data packets also facilitates function development and improves the intelligence of smart home control and management.…”
Section: Smart Home Control and Managementmentioning
confidence: 99%
“…When ensuring security during data transmission and storage, there should be protocols set in place as describer in [267] to protect the identify of communicating units during encryption. To evaluate a protocol, the author in [268] state that a simulation can be performed based on typical circumstances of attacks.…”
Section: Privacy-preserving Protocolsmentioning
confidence: 99%
“…This paper focuses on securing data in transit, which is notably more susceptible to attacks when compared to other stages within the data life cycle [16]. Consequently, data must be kept protected from unauthorized access and other threats [17]. The transmitted data should not only be authentic but also free from unauthorized modifications [13,18,19].…”
Section: Introductionmentioning
confidence: 99%