Dec 24, 2019 · In this article, we focus on how to apply the expensive ORAM to protect access pattern in IoT devices and propose an ORAM scheme supporting thin ...
In this article, we focus on how to apply the expensive ORAM to protect access pattern in IoT devices and propose an ORAM scheme supporting thin-client.
We further show how to securely deploy ThinORAM in the fog computing environment to achieve oblivious data access to minimum client cost. Experiments show ...
Dec 24, 2019 · We further show how to securely deploy ThinORAM in the fog computing environment to achieve oblivious data access with minimum client cost.
Dive into the research topics of 'ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment'. Together they form a unique fingerprint. Sort ...
People also ask
What are the main challenges in fog computing?
How data is stored in fog computing?
What are the security issues with fog computing?
What is the disadvantage of fog computing?
... ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. IEEE Transactions on Services Computing, 13 (4). pp. 602-612. ISSN 1939-1374.
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. IEEE Trans. Serv. Comput. 13(4): 602-612 (2020). [+][–]. 2010 – 2019. FAQ. see ...
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. 602-612. view. electronic edition via DOI · unpaywalled version · references ...
Practicing Oblivious Access on Cloud Storage | Request PDF
www.researchgate.net › publication › 30...
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. Article. Dec 2019. Yanyu Huang · Bo Li · Zheli Liu · Brij B. Gupta.
This work mainly discussed the security access control technology in fog computing environment, clarified its key parts, and analyzed its effective control ...