-
1
Securing Big Data Processing With Homomorphic Encryption
Published 2020“…The arrival of Big Data era has challenged the conventional end-to-end data protection mechanism due to its associated high volume, velocity and variety characteristics. …”
Get full text
Get full text
Article -
2
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
Published 2021-10-01“…Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment.…”
Get full text
Article -
3
Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) Scheme for Securing Cloud Application in Multi-users Environment
Published 2016“…This paper proposed the Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) scheme for providing an end-to end data protection in multi-users cloud environments. The proposed KP-ABFHE scheme is able to perform the computation while providing fine-grained access on the encrypted data. …”
Get full text
Get full text
Article -
4
A survey of homomorphic encryption for outsourced big data
Published 2016“…This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. …”
Get full text
Get full text
Article -
5
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
Published 2021“…Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment.…”
Get full text
Get full text
Article