Computer Science ›› 2020, Vol. 47 ›› Issue (6): 276-283.doi: 10.11896/jsjkx.190400116
• Information Security • Previous Articles Next Articles
LIANG Jun-bin, ZHANG Min, JIANG Chan
CLC Number:
[1]ZHU C,LEUNG V C M,RODRIGUES J J P C,et al.Social Sensor Cloud:Framework,Greenness,Issues,and Outlook[J].IEEE Network,2018,32(5):100-105. [2]XU Q,SU Z,YU S,et al.Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud[J].IEEE Tran-sactions on Big Data,2017,doi:10.1109/TBDATA.2017.2764925. [3]AAMIR T,BOUGUETTAYA A,DONG H,et al.Social-Sensor Cloud Service Selection[C]//IEEE International Conference on Web Services.IEEE,2017:508-515. [4]WANG T,LI Y,JIA W J,et al.Research progress of sensor-cloud security[J].Journal on Communications J. Communs.,2018,39(3):35-52. [5]GHARINEIAT A,BOUGUETTAYA A,SELLIS T,et al. Crowdsourced Coverage as a Service:Two-Level Composition of Sensor Cloud Services[J].IEEE Transactions on Knowledge and Data Engineering,2017:1384-1397. [6]CHARD K,CATON S,RANA O,et al.Social Clouds:A Retrospective[J].IEEE Cloud Computing,2016,2(6):30-40. [7]REYES R J R,DE MENDONCA F F D,DIAS K L.A Service-Oriented Architecture with Data Virtualization Support for Cloud-Based Wireless Sensor Networks[C]//2017 VII Brazilian Symposium on Computing Systems Engineering (SBESC).IEEE,2017:199-204. [8]CHANG C,SRIRAMA S N,LIYANAGE M.A service-oriented mobile cloud middleware framework for provisioning mobile sensing as a service[C]//2015 IEEE 21st International Confe-rence on Parallel and Distributed Systems (ICPADS).IEEE,2015:124-131. [9]RANI S,AHMED S H,TALWAR R,et al.Can Sensors Collect Big Data?An Energy Efficient Big Data Gathering Algorithm for WSN[J].IEEE Transactions on Industrial Informatics,2017:1961-1968. [10]NAKASHIMA K,YOKOYAMA M,TANIYAMA Y,et al.s3 system:A system for sharing social sensor data and analytical programs[C]//Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems:Computing Networking and Services.ACM,2016:147-152. [11]ZENG J D,WANG T,JIA W J,et al.Research progress of sensor-cloud [J].Journal of Computer Research and Development,2017,54(5):925-939. [12]PETRI I,DIAZ-MONTES J,RANA O,et al.Modelling and implementing social community clouds[J].IEEE Transactions on Services Computing,2017,10(3):410-422. [13]CHATTERJEE S,LADIA R,MISRA S.Dynamic optimal pricing for heterogeneous service-oriented architecture of sensor-cloud infrastructure[J].IEEE Transactions on Services Computing,2017,10(2):203-216. [14]AAMIR T,DONG H,BOUGUETTAYA A.Trust in social-sensor cloud service[C]//2018 IEEE International Conference on Web Services (ICWS).IEEE,2018:359-362. [15]BILECKI L F,FIORESE A.A Trust Reputation Architecture for Cloud Computing Environment[C]//2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).IEEE,2017:614-621. [16]BHATT S,KRISHNAMURTHY V.Controlled information fusion with risk-averse CVaR social sensors[C]//2017 IEEE 56th Annual Conference on Decision and Control (CDC).IEEE,2017:2605-2610. [17]REZVANI M,IGNJATOVIC A,BERTINO E,et al.A trust assessment framework for streaming data in wsns using iterative filtering[C]//2015 IEEE Tenth International Conference on Intelligent Sensors,Sensor Networks and Information Processing (ISSNIP).IEEE,2015:1-6. [18]CHARD K,CATON S,RANA O,et al.Social cloud:Cloud computing in social networks[C]//2010 IEEE 3rd International Conference on Cloud Computing.IEEE,2010:99-106. [19]MRABET M,BEN SAIED Y,SAIDANE L A.Modeling correlation between QoS attributes for trust computation in cloud computing environments[C]//Proceedings of the 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing.IEEE,2017:488-497. [20]CHARD K,BUBENDORFER K,CATON S,et al.Social Cloud Computing:A Vision for Socially Motivated Resource Sharing[J].IEEE Transactions on Services Computing,2012,5(4):551-563. [21]MADRIA S,KUMAR V,DALVI R.Sensor Cloud:A Cloud of Virtual Sensors[J].IEEE Software,2014,31(2):70-77. [22]AIKO Z,NAKASHIMA K,YOSHIHISA T,et al.A Social Sensor Visualization System for a Platform to Generate and Share Social Sensor Data[C]//2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).IEEE,2018,2:628-633. [23]YI X,BOUGUETTAYA A,GEORGAKOPOULOS D,et al. Privacy protection for wireless medical sensor data[J].IEEE Transactions on Dependable and Secure Computing,2015,13(3):369-380. [24]BIJARBOONEH F H,DU W,NGAI C H,et al.Cloud-Assisted Data Fusion and Sensor Selection for Internet-of-Things[J].IEEE Internet of Things Journal,2015,3(3):257-268. [25]LI F,WANG X,CHEN H,et al.Clickleak:keystroke leaks through multimodal sensors in cyber-physical social networks[J].IEEE Access,2017,5:27311-27321. [26]JIANG J,HAN G,WANG F,et al.An Efficient DistributedTrust Model for Wireless Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2015,26(5):1228-1237. [27]WANG T,LI Y,FANG W,et al.A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud System[J].IEEE Transactions on Big Data,2018,doi:10.1109/TBDATA.2018.2811501. [28]MUSAEV A,PU C.Landslide information service based on composition of physical and social sensors[C]//2017 IEEE 33rd International Conference on Data Engineering (ICDE).IEEE,2017:1415-1416. [29]LAU R Y K.Toward a social sensor based framework for intelligent transportation[C]//2017 IEEE 18th International Symposium on A World of Wireless,Mobile and Multimedia Networks (WoWMoM).IEEE,2017:1-6. [30]WANG G,GUI X L.Selecting and Trust Computing for Transaction Nodes in Online Social Networks[J].Chinese Journal of Computers,2013,36(2):368-383. [31]PRAVEENA A,SMYS S.Ensuring data security in cloud based social networks[C]//2017 International Conference ofElectro-nics,Communication and Aerospace Technology (ICECA).IEEE,2017,2:289-295. [32]GULER B,VARAN B,TUTUNCUOGLU K,et al.Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships[J].IEEE Journal of Selected Topics in Signal Processing,2015,9(2):360-373. [33]WANG E K,LI Y,YE Y,et al.A Dynamic Trust Framework for Opportunistic Mobile Social Networks[J].IEEE Transactions on Network and Service Management,2017:319-329. [34]XIA F,JEDARI B,YANG L T,et al.A Signaling Game for Uncertain Data Delivery in Selfish Mobile Social Networks[J].IEEE Transactions on Computational Social Systems,2017,3(2):100-112. [35]MOOSAVI H,BUI F M.A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2014,9(9):1367-1379. [36]HAN G,LIU L,JIANG J,et al.Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks[J].IEEE Transactions on Industrial Informatics,2017,13(1):135-143. [37]MAHBOUBI H,MOEZZI K,AGHDAM A G,et al.Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors[J].IEEE Transactions on Industrial Informatics,2014,10(1):163-174. [38]ANANTVALEE T,WU J.A survey on intrusion detection in mobile ad hoc networks[M]//Wireless Network Security.Boston:Springer,2007:159-180. [39]BAIG Z A.Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks[J].Computer Communications,2011,34(3):468-484. [40]LIU J,YU J,SHEN S.Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds[J].IEEE Transactions on Information Forensics and Security,2018,13(2):408-420. [41]BORUJENI E M,RAHBARI D,NICKRAY M.The impact of security services on fog-based WSNs lifetime[C]//2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI).IEEE,2017:984-991. [42]ZHU C,SHU L,LEUNG V C M,et al.Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City[J].IEEE Communications Magazine,2017,55(12):24-30. [43]CHARD K,CATON S,RANA O,et al.Social cloud:Cloud computing in social networks[C]//2010 IEEE 3rd International Conference on Cloud Computing.IEEE,2010:99-106. [44]KWAK D,LIU R,KIM D,et al.Seeing is believing:Sharing real-time visual traffic information via vehicular clouds[J].IEEE Access,2016,4:3617-3631. [45]GONG X,CHEN X,ZHANG J,et al.Exploiting social trust assisted reciprocity (STAR) toward utility-optimal socially-aware crowdsensing[J].IEEE Transactions on Signal and Information Processing over Networks,2015,1(3):195-208. [46]DINH T,KIM Y.An efficient interactive model for on-demand sensing-as-a-services of sensor-cloud[J].Sensors,2016,16(7):992. [47]YUAN J,LI X.A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion[J].IEEE Access,2018,6:23626-23638. [48]DINH T,KIM Y.An efcient sensor-cloud interactive model for on-demand latency requirement guarantee[C]//2017 IEEE International Conference on Communications (ICC).IEEE,2017:1-6. [49]RACHKIDI E E,AGOULMINE N,CHENDEB N,et al.Resources optimization and effcient distribution of shared virtual sensors in sensor-cloud[C]//2017 IEEE InternationalConfe-rence on Communications (ICC).IEEE,2017:1-6. [50]KIM S.An Effective Sensor Cloud Control Scheme based on a Two-stage Game Approach[J].IEEE Access,2018,PP(99):20430-20439. |
[1] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[2] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[3] | WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426. |
[4] | PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319. |
[5] | CHEN Yu-ping, LIU Bo, LIN Wei-wei, CHENG Hui-wen. Survey of Cloud-edge Collaboration [J]. Computer Science, 2021, 48(3): 259-268. |
[6] | WANG Wen-juan, DU Xue-hui, REN Zhi-yu, SHAN Di-bin. Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation [J]. Computer Science, 2021, 48(2): 317-323. |
[7] | JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22. |
[8] | MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11. |
[9] | WANG Qin, WEI Li-fei, LIU Ji-hai, ZHANG Lei. Private Set Intersection Protocols Among Multi-party with Cloud Server Aided [J]. Computer Science, 2021, 48(10): 301-307. |
[10] | ZHNAG Kai-qi, TU Zhi-ying, CHU Dian-hui, LI Chun-shan. Survey on Service Resource Availability Forecast Based on Queuing Theory [J]. Computer Science, 2021, 48(1): 26-33. |
[11] | LEI Yang, JIANG Ying. Anomaly Judgment of Directly Associated Nodes Under Cloud Computing Environment [J]. Computer Science, 2021, 48(1): 295-300. |
[12] | XU Yun-qi, HUANG He, JIN Zhong. Application Research on Container Technology in Scientific Computing [J]. Computer Science, 2021, 48(1): 319-325. |
[13] | LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323. |
[14] | MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423. |
[15] | JIN Xiao-min, HUA Wen-qiang. Energy Optimization Oriented Resource Management in Mobile Cloud Computing [J]. Computer Science, 2020, 47(6): 247-251. |
|