- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- Caching and Content Delivery
- Transportation and Mobility Innovations
- Cryptography and Data Security
Xi'an Jiaotong University
2020-2022
The application of blockchain to Vehicular Edge Computing (VEC) has attracted significant interests. As the Internet Things plays an essential and fundamental role for data collecting, analyzing, management in VEC, it is vital guarantee security data. However, resource-constraint nature edge node makes challenging meet needs maintain long life-cycle IoT since vast volumes quickly increase. In this paper, we propose Acce-chain, a storage-elastic based on different storage capacities at edge....
Data deduplication technique could greatly save the storage overhead of cloud by eliminating duplicated data and retaining one copy. In order to ensure privacy against an untrusted cloud, many cryptographic schemes have been proposed make feasible in ciphertext. A typical scheme is Message-Locked Encryption (MLE), which takes hash values messages as encryption keys. However, MLE vulnerable side-channel attacks. Current solutions trying mitigate these attacks raise either expensive or...
Since 2011, the private ride-hailing companies Didi (2019), Uber (2019) and Lyft (2021) have expanded into more cities. These services (RHS) bring convenience to our life; however, at same time they, also raise security concerns for users. For example, several recent news items show that a considerable number of registered drivers whose licenses been revoked are still taking RHS orders on respective platforms; this phenomenon directly leads insecurity part its users bad reputation service...
Cloud computing is an essential technique to provide item traceability for industrial internet of things (IIoT) systems by providing data sharing services. However, a malicious cloud server may prevent participants from acquiring accurate items inconsistent data. To fix this issue, we propose Acics, consistency auditing scheme in untrusted services cloud-aided IIoT systems. Acics presents two variants named S-Acics and L-Acics. enables audit each circularly play the role. L-Acics further...