A systematic literature review on data privacy and security techniques in smart cities: trends, gaps, and future directions (original) (raw)

References

  1. Lingfeng Qu M, Li Y, Sun S, Su Y, Liu L, Zhang (2024) Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer, Journal of King Saud University - Computer and Information Sciences, Volume 36, Issue 1, 101914, ISSN 1319–1578. https://doi.org/10.1016/j.jksuci.2024.101914
  2. Qiao Liu Q, Han G, Luo J, Cao H, Li Y, Wang (2024) Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles, Microprocessors and Microsystems, Volume 104, 104965, ISSN 0141–9331. https://doi.org/10.1016/j.micpro.2023.104965
  3. Ji X, Chen Y, Yang W, Wu Q Security and data encryption effect of high ciphertext based on improved RC6 algorithm for WSN, results in physics, 53, 2023, 106959, ISSN 2211–3797, https://doi.org/10.1016/j.rinp.2023.106959
  4. Mohanad A, Mohammed, Hala B, Abdul Wahab (2023) Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption, CMES - Computer Modeling in Engineering and Sciences, Volume 138, Issue 2, Pages 1731–1748, ISSN 1526 – 1492. https://doi.org/10.32604/cmes.2023.030528
  5. Chen A, Yu S, Yang X, Huang D, Ren Y IoT data security in outsourced databases: A survey of verifiable database, Heliyon, Volume 10, Issue 7, 2024, e28117, ISSN 2405–8440. https://doi.org/10.1016/j.heliyon.2024.e28117
  6. Saifur Rahman S, Pal S, Mittal T, Chawla C, Karmakar SYN-GAN A robust intrusion detection system using GAN-based synthetic data for IoT security, internet of things, 26, 2024, 101212, ISSN 2542–6605, https://doi.org/10.1016/j.iot.2024.101212
  7. Bui T-D, Tseng J-W, Tsai FM, Ali MH, Ming K, Lim M-L, Tseng Energy security challenges and opportunities in the carbon neutrality context: A hierarchical model through systematic data-driven analysis, renewable and sustainable energy reviews, 187, 2023, 113710, ISSN 1364 – 0321, https://doi.org/10.1016/j.rser.2023.113710
  8. Brij B, Gupta A, Gaurav PK, Panigrahi (2023) Analysis of security and privacy issues of information management of big data in B2B based healthcare systems. J Bus Res 162:0148–2963. https://doi.org/10.1016/j.jbusres.2023.113859
    Article Google Scholar
  9. Haoran Ni Z, Guo C, Li S, Dou C, Yao T, Baker (2022) Network Coding-based resilient routing for maintaining data security and availability in Software-Defined networks. J Netw Comput Appl 205:1084–8045. https://doi.org/10.1016/j.jnca.2022.103372
    Article Google Scholar
  10. Reshi A, Sholla S (2023) The blockchain conundrum: An in-depth examination of challenges, contributing technologies, and alternatives, Concurrency and Computation: Practice and Experience, Dec. 19. https://doi.org/10.1002/cpe.7987
  11. Sharmila Ghosh A, Saha T, Pal AK, Jha (2024) Procedia Comput Sci 235 Pages 1024–1033, ISSN 1877 – 0509. https://doi.org/10.1016/j.procs.2024.04.097. A comparative analysis of chaos theory based medical image steganography to enhance data security
  12. Maurice Osewe L, Aijun H, Jiqin (2023) Sustainable intensification and food security: A panel data assessment of the smallholder maize farmers in Uganda, Global Food Security, Volume 39, 100724, ISSN 2211–9124. https://doi.org/10.1016/j.gfs.2023.100724
  13. Judy Flavia B, Balika J, Chelliah (2023) Artificial Lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments. Computers Secur 135 103475:0167–4048. https://doi.org/10.1016/j.cose.2023.103475
    Article Google Scholar
  14. Saima Kanwal F, Tao A, Almogren AU, Rehman R, Taj A, Radwan, Sciences (2022) Volume 134, Issue 1, Pages 201–219, ISSN 1526 – 1492, https://doi.org/10.32604/cmes.2022.020255
  15. Guo X, Liang G, Liu J, Chen X, Continua (2023) Volume 77, Issue 3, Pages 3305–3323, ISSN 1546–2218, https://doi.org/10.32604/cmc.2023.044529
  16. Farayola OA, SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES (2024) DATA PRIVACY AND. Comput Sci IT Res J 5(3):606–615. https://doi.org/10.51594/csitrj.v5i3.909
    Article Google Scholar
  17. Alhitmi HK, Mardiah A, Al-Sulaiti KI, Abbas J (2024) Data security and privacy concerns of AI-driven marketing in the context of economics and business field: an exploration into possible solutions. Cogent Bus Manage 11(1). https://doi.org/10.1080/23311975.2024.2393743
  18. Oyewole AT, Oguejiofor BB, Eneh NE, THEIR IMPACT ON FINANCIAL TECHNOLOGY COMPANIES: A REVIEW (2024) Chidiogo Uzoamaka Akpuokwe, & Seun Solomon Bakare. Comput Sci IT Res J 5(3):628–650. https://doi.org/10.51594/csitrj.v5i3.911. DATA PRIVACY LAWS AND
  19. Ray RK, Chowdhury FR, Hasan MR (2024) Blockchain applications in retail cybersecurity: enhancing supply chain integrity, secure transactions, and data protection. J Bus Manage Stud 6(1):206–214. https://doi.org/10.32996/jbms.2024.6.1.13
    Article Google Scholar
  20. Paar C, Pelzl J, Güneysu T (2024) Introduction to cryptography and data security. Understanding cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-69007-9_1
    Chapter Google Scholar
  21. Su G, Wang J, Xu X, Wang Y, Wang C (2024) The utilization of homomorphic encryption technology grounded on artificial intelligence for privacy preservation. Int J Comput Sci Inform Technol 2(1):52–58. https://doi.org/10.62051/ijcsit.v2n1.07
    Article Google Scholar
  22. PRIVACY: ADVANCED RISK MANAGEMENT STRATEGIES FOR PRODUCT DEVELOPMENT IN THE U.S. Computer Science & (2024) IT Res J 5(4):878–891. https://doi.org/10.51594/csitrj.v5i4.1047. PROACTIVE
  23. Wiryawan D, Ramadhan W, Krisnata F, Dhiya’ F, Ulhaq Data Security Framework with Cognitive Theory on Higher Education, 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS), Manama, Bahrain, 2024, pp. 263–268. https://doi.org/10.1109/ICETSIS61505.2024.10459503
  24. Abdi AH et al (2024) Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions, in IEEE Access, vol. 12, pp. 69941–69980. https://doi.org/10.1109/ACCESS.2024.3393548
  25. Dansarie M (2024) Security issues in Special-Purpose digital radio communication systems: A systematic review. IEEE Access 12:91101–91126. https://doi.org/10.1109/ACCESS.2024.3420091
    Article Google Scholar
  26. Albshaier L, Budokhi A, Aljughaiman A (2024) A Review of Security Issues When Integrating IoT With Cloud Computing and Blockchain, in IEEE Access, vol. 12, pp. 109560–109595. https://doi.org/10.1109/ACCESS.2024.3435845
  27. Mishall Al-Zubaidie RA, Muhajjar (2024) Procedia Comput Sci 237 Pages 43–52, ISSN 1877 – 0509. https://doi.org/10.1016/j.procs.2024.05.078. Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors
  28. Adam M, Hammoudeh M, Alrawashdeh R, Alsulaimy B (2024) A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems, in IEEE Access, vol. 12, pp. 57128–57149. https://doi.org/10.1109/ACCESS.2024.3382709
  29. Elkourdi F, Wei C, Xiao L, Z. YU and, Asan O (2024) Exploring current practices and challenges of HIPAA compliance in software engineering: scoping review. IEEE Open J Syst Eng 2:94–104. https://doi.org/10.1109/OJSE.2024.3392691
    Article Google Scholar
  30. Moher D, Liberati A, Tetzlaff J, Altman DG, The PRISMA Group (2009) Preferred reporting items for systematic reviews and Meta-Analyses: the PRISMA statement. PLoS Med 6(7):e1000097. https://doi.org/10.1371/journal.pmed.1000097
    Article Google Scholar
  31. Bibliometrix and Biblioshiny tool in R software. Online Link: https://www.bibliometrix.org/home/
  32. K-means clustering using bibliometrix R tool Online Link https://www.jscires.org/article/326
  33. Murtagh F (2007) Multiple correspondence analysis and related methods. Psychometrika 72:275. https://doi.org/10.1007/s11336-006-1579-x
    Article Google Scholar
  34. Setijadi Prihatmanto A, Andrian R, Danar Sunindyo W, Sutriadi R (2024) Transforming Public Services: A Systematic Review of Smart Government Frameworks, Architectures, and Implementation Challenges, in IEEE Access, vol. 12, pp. 135799–135810. https://doi.org/10.1109/ACCESS.2024.3450907
  35. Naseer A, Shmoon M, Shakeel T, Ur Rehman S, Ahmad A, Gruhn V (2024) A Systematic Literature Review of the IoT in Agriculture—Global Adoption, Innovations, Security, and Privacy Challenges, in IEEE Access, vol. 12, pp. 60986–61021. https://doi.org/10.1109/ACCESS.2024.3394617
  36. Brée T, Karger E, Ahlemann F (2024) Shaping the Future of Data Ecosystem Research—What Is Still Missing? in IEEE Access, vol. 12, pp. 103162–103175. https://doi.org/10.1109/ACCESS.2024.3432969
  37. Muniswamy A, Rathi R (2024) A Detailed Review on Enhancing the Security in Internet of Things-Based Smart City Environment Using Machine Learning Algorithms, in IEEE Access, vol. 12, pp. 120389–120413. https://doi.org/10.1109/ACCESS.2024.3450180
  38. Bhatt S, Bhushan B, Srivastava T, Anoop VS (2023) Post-Quantum cryptographic schemes for security enhancement in 5G and B5G (Beyond 5G) cellular networks. In: Bhushan B, Sharma SK, Kumar R, Priyadarshini I (eds) 5G and beyond. Springer Tracts in Electrical and Electronics Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-99-3668-7_12
    Chapter Google Scholar
  39. Yang Z, Alfauri H, Farkiani B, Jain R, Pietro RD, Erbad A (Secondquarter 2024) A survey and comparison of Post-Quantum and quantum blockchains. IEEE Commun Surv Tutorials 26(2):967–1002. https://doi.org/10.1109/COMST.2023.3325761
  40. Hekkala J, Muurman M, Halunen K et al (2023) Implementing Post-quantum cryptography for developers. SN COMPUT SCI 4:365. https://doi.org/10.1007/s42979-023-01724-1
    Article Google Scholar
  41. Pulido-Gaytan B, Tchernykh A, Cortés-Mendoza JM et al (2021) Privacy-preserving neural networks with homomorphic encryption: challenges and opportunities. Peer-to-Peer Netw. Appl 14:1666–1691. https://doi.org/10.1007/s12083-021-01076-8
    Article Google Scholar
  42. Amin Almaiah M, Ali A, Alkhdour T, Lutfi A (2024) Security Risk and Breach Detection Approach Based Blockchain for Medical Applications, in IEEE Access, vol. 12, pp. 171876–171896. https://doi.org/10.1109/ACCESS.2024.3487217
  43. Liang Luo L, Xing G, Levitin (2019) Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks, Reliability Engineering & System Safety, Volume 192, 106265, ISSN 0951–8320. https://doi.org/10.1016/j.ress.2018.09.014
  44. Khan MA, Javaid S, Mohsan SAH, Tanveer M, Ullah I (2024) Future-Proofing security for UAVs with Post-Quantum cryptography: A review. IEEE Open J Commun Soc 5:6849–6871. https://doi.org/10.1109/OJCOMS.2024.3486649
    Article Google Scholar
  45. Akshatha PS, Dilip Kumar SM (2023) MQTT and blockchain sharding: An approach to user-controlled data access with improved security and efficiency, Blockchain: Research and Applications, Volume 4, Issue 4, 100158, ISSN 2096–7209. https://doi.org/10.1016/j.bcra.2023.100158
  46. Isma’ila UA, Danyaro KU, Muazu AA, Maiwada UD (2024) Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices, in IEEE Access, vol. 12, pp. 30941–30961. https://doi.org/10.1109/ACCESS.2024.3369915
  47. Ahmed AA, Alabi OO (2024) Secure and scalable Blockchain-Based federated learning for cryptocurrency fraud detection: A systematic review. IEEE Access 12:102219–102241. https://doi.org/10.1109/ACCESS.2024.3429205
    Article Google Scholar
  48. Yuting Yang Y, Lu G, Mei (2023) A federated learning based approach for predicting landslide displacement considering data security. Future Generation Comput Syst 149 Pages 184–199, ISSN 0167-739X. https://doi.org/10.1016/j.future.2023.07.021
  49. Reshi IA, Sholla S (2024) Securing IoT data: fog computing, blockchain, and tailored privacy-enhancing technologies in action. Peer-to-Peer Netw Appl 17:3905–3933. https://doi.org/10.1007/s12083-024-01801-z
    Article Google Scholar
  50. Rawat SS, Alotaibi Y, Malsa N, Gupta V (2023) Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology, Computers, Materials and Continua, Volume 76, Issue 2, Pages 1797–1815, ISSN 1546–2218. https://doi.org/10.32604/cmc.2023.039381
  51. Tian H, Jian Y, Ge X (2022) Blockchain-based AMI framework for data security and privacy protection, Sustainable Energy, Grids and Networks, Volume 32, 100807, ISSN 2352–4677. https://doi.org/10.1016/j.segan.2022.100807
  52. Mohammad AS, Part A (2021) 0045–7906, https://doi.org/10.1016/j.compeleceng.2021.107527
  53. Mwungu CM, Shikuku KM, Atibo C, Mwongera C Survey-based data on food security, nutrition and agricultural production shocks among rural farming households in Northern uganda, data in brief, 23, 2019, 103818, ISSN 2352–3409, https://doi.org/10.1016/j.dib.2019.103818
  54. Lidia Ogiela U, Ogiela (2019) Cognitive and biologically cryptographic protocols for data security. Cogn Syst Res 56 Pages 1–6, ISSN 1389 – 0417. https://doi.org/10.1016/j.cogsys.2019.02.008
  55. Umapathy B, Kalpana G, A novel symmetric cryptographic method to design block complexity for data security, Computers and Electrical Engineering, Volume 104, Part B (2022) 108467, ISSN 0045-7906. https://doi.org/10.1016/j.compeleceng.2022.108467
  56. Li Y, Zhang Q, Zhang L, Ye Y, Zhang R, Gu X, Liu R, Zhu H AIPE-active Ir(Ⅲ) complexes with reversible piezochromic behavior and its application for data security protection. J Organomet Chem, 930, 2020, 121595, ISSN 0022-328X, https://doi.org/10.1016/j.jorganchem.2020.121595
  57. Por LY, Ng IO, Chen Y-L, Yang J, Ku CS (2024) A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords, in IEEE Access, vol. 12, pp. 53408–53423. https://doi.org/10.1109/ACCESS.2024.3373662
  58. Pratima Sharma MD, Borah S, Namasudra (2021) Improving security of medical big data by using Blockchain technology, Computers & Electrical Engineering, Volume 96, Part A, 107529, ISSN 0045-7906. https://doi.org/10.1016/j.compeleceng.2021.107529
  59. Tao, Lu (2022) Network security risk assessment of football matches based on data mining technology, Optik, Volume 270, 169945, ISSN 0030-4026. https://doi.org/10.1016/j.ijleo.2022.169945
  60. Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Netw Comput Appl 134 Pages 26–39, ISSN 1084–8045. https://doi.org/10.1016/j.jnca.2019.02.015
  61. Akalanka Mailewa S, Mengel L, Gittner H, Khan Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers, Array, Volume 15, 2022, 100236, ISSN 2590-0056. https://doi.org/10.1016/j.array.2022.100236
  62. Yudhistira Nugraha A, Martin (2021) Towards a framework for trustworthy data security level agreement in cloud procurement, Computers & Security, Volume 106, 102266, ISSN 0167–4048. https://doi.org/10.1016/j.cose.2021.102266
  63. Anjali Yeole DR, Kalbande A, Sharma (2019) Security of 6LoWPAN IoT Networks in Hospitals for Medical Data Exchange, Procedia Computer Science, Volume 152, Pages 212–221, ISSN 1877 – 0509, https://doi.org/10.1016/j.procs.2019.05.045
  64. Turet JG, Costa APCS Hybrid methodology for analysis of structured and unstructured data to support decision-making in public security, Data Knowl Eng, 141, 2022, 102056, ISSN 0169-023X, https://doi.org/10.1016/j.datak.2022.102056
  65. Elahi H, Wang G, Jiang W, Bartel A, Le Traon Y (April 2024) A qualitative study of app acquisition and management. IEEE Trans Comput Social Syst 11(2):1907–1925. https://doi.org/10.1109/TCSS.2023.3288562
  66. Chen X (2020) A security integration model for private data of intelligent mobile communication based on edge computing, Computer Communications, Volume 162, Pages 204–211, ISSN 0140–3664. https://doi.org/10.1016/j.comcom.2020.08.026
  67. Alaoui IE, Gahi Y, Network Security Strategies in Big Data Context, Science PC (2020) Volume 175, Pages 730–736, ISSN 1877 – 0509, https://doi.org/10.1016/j.procs.2020.07.108
  68. Abiodun OI, Alawida M, Omolara AE, Alabdulatif A (2022) Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey, Journal of King Saud University - Computer and Information Sciences, Volume 34, Issue 10, Part B, Pages 10217–10245, ISSN 1319–1578. https://doi.org/10.1016/j.jksuci.2022.10.018
  69. Kishori Kasat D, Leela Rani B, Khan AJ, Kirubakaran MK, Malathi P A novel security framework for healthcare data through IOT sensors, measurement: sensors, 24, 2022, 100535, ISSN 2665–9174, https://doi.org/10.1016/j.measen.2022.100535
  70. Alireza Shameli-Sendi (2020) An efficient security data-driven approach for implementing risk assessment. J Inform Secur Appl 54 102593, ISSN 2214 – 2126. https://doi.org/10.1016/j.jisa.2020.102593
  71. Andrea, Babbs (2020) How to leverage data security in a post-Covid world, Computer Fraud & Security, Volume Issue 10, 2020, Pages 8–11, ISSN 1361–3723. https://doi.org/10.1016/S1361-3723(20)30107-X
  72. Claudio A, Ardagna V, Bellandi E, Damiani M, Bezzi C, Hebert Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists, Comput Electr Eng, 93, 2021, 107215, ISSN 0045-7906, https://doi.org/10.1016/j.compeleceng.2021.107215
  73. Wang W, Mahakala KR, Gupta A, Hussein N, Wang Y (2019) Data on security requirements in open-source software projects, Data in Brief, Volume 25, 103590, ISSN 2352–3409. https://doi.org/10.1016/j.dib.2018.12.029
  74. Jie Chen L, Ramanathan M, Alazab (2021) Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities. Microprocess Microsyst 81:0141–9331. https://doi.org/10.1016/j.micpro.2020.103722
    Article Google Scholar
  75. Hong Lei J, Li S, Li M, Huang J, Cheng Y, Bai X, Luo C, Liu, Continua (2022) Volume 73, Issue 3, Pages 5687–5702, ISSN 1546–2218, https://doi.org/10.32604/cmc.2022.030995
  76. Mehrbakhsh Nilashi RA, Abumalloh S, Samad M, Alrizq S, Alyami H, Abosaq A, Alghamdi (2022) Noor Adelyna Mohammed Akib, Factors impacting customer purchase intention of smart home security systems: Social data analysis using machine learning techniques, Technology in Society, Volume 71, 102118, ISSN 0160-791X. https://doi.org/10.1016/j.techsoc.2022.102118
  77. Charlene, Bunting (2019) Cloud security: how to protect critical data and stay productive, Network Security, Volume Issue 9, 2019, Pages 18–19, ISSN 1353–4858. https://doi.org/10.1016/S1353-4858(19)30110-2
  78. Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E (2020) Comput Commun 151:495–517. https://doi.org/10.1016/j.comcom.2020.01.016. Abdul Salam Mohamed Nainar, Nazihah Md Akim, Muhammad Imran, Deep learning and big data technologies for IoT security
  79. Ibrahim A, Elgendy W, Zhang Y-C, Tian K, Li (2019) Resource allocation and computation offloading with data security for mobile edge computing. Future Generation Comput Syst 100 Pages 531–541, ISSN 0167-739X. https://doi.org/10.1016/j.future.2019.05.037
  80. Fu Y, Chen H, Zheng Q, Kantola ZYR, Jing X, Cao J, Li H (2020) J Netw Comput Appl 155:1084–8045. https://doi.org/10.1016/j.jnca.2020.102549., An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks
  81. Wei Ren X, Wan (2021) Pengcheng Gan, A double-blockchain solution for agricultural sampled data security in Internet of Things network, Future Generation Computer Systems, Volume 117, Pages 453–461, ISSN 0167-739X. https://doi.org/10.1016/j.future.2020.12.007
  82. Leila, Powell (2020) How data can be the lingua franca for security and IT, Network Security, Volume Issue 6, 2020, Pages 6–7, ISSN 1353–4858. https://doi.org/10.1016/S1353-4858(20)30065-9
  83. Muhammad Adil MK, Khan (2021) Sustainable Cities Soc 75:2210–6707. https://doi.org/10.1016/j.scs.2021.103311. Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions
  84. Sandeep Pirbhulal OW, Samuel W, Wu AK, Sangaiah G, Li (2019) Future Generation Comput Syst 95 Pages 382–391, ISSN 0167-739X. https://doi.org/10.1016/j.future.2019.01.008. A joint resource-aware and medical data security framework for wearable healthcare systems
  85. Wu J, Gan W, Chao H-C, Yu PS (2024) Geospatial big data: survey and challenges. IEEE J Sel Top Appl Earth Observations Remote Sens 17:17007–17020. https://doi.org/10.1109/JSTARS.2024.3438376
    Article Google Scholar
  86. Zyoud B, Lebai Lutfi S (2024) The role of information security culture in zero trust adoption: insights from UAE organizations, in IEEE access. 12:72420–72444. https://doi.org/10.1109/ACCESS.2024.3402341
  87. Velasco FA, Palomares JM, Olivares J Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs, Comput Netw, 199, 2021, 108470, ISSN 1389 – 1286, https://doi.org/10.1016/j.comnet.2021.108470
  88. Amoon M, Altameem T, Altameem A (2020) Internet of things sensor assisted security and quality analysis for health care data sets using artificial intelligent based heuristic health management system, Measurement, Volume 161, 107861, ISSN 0263–2241. https://doi.org/10.1016/j.measurement.2020.107861
  89. Hassan Noura O, Salman A, Chehab (2019) Raphaël couturier, preserving data security in distributed fog computing. Ad Hoc Netw 94:1570–8705. https://doi.org/10.1016/j.adhoc.2019.101937
    Article Google Scholar
  90. Kautsarina AN, Hidayanto B, Anggorojati Z, Abidin K, Phusavat (2020) Data modeling positive security behavior implementation among smart device users in Indonesia: A partial least squares structural equation modeling approach (PLS-SEM), Data in Brief, Volume 30, 105588, ISSN 2352–3409. https://doi.org/10.1016/j.dib.2020.105588
  91. Lanre Amodu O, Odiboh S, Usaini D, Yartey T, Ekanem (2019) Data Brief 27 104663:2352–3409. https://doi.org/10.1016/j.dib.2019.104663. Data on security implications of the adoption of Internet of Things by public relations professionals
  92. Amjad Rehman K, Haseeb T, Saba H, Kolivand M-SMDM, Technology, Innovation Volume 24, 2021, 101802, ISSN 2352 – 1864, https://doi.org/10.1016/j.eti.2021.101802
  93. Tatiana M, Kanner AM, Kanner AV, Epishkina (2021) Algorithm for Optimal and Complete Testing of Software and Hardware Data Security Tools, Procedia Computer Science, Volume 190, Pages 408–413, ISSN 1877 – 0509, https://doi.org/10.1016/j.procs.2021.06.049
  94. Zhiying Wang N, Wang X, Su S, Ge (2020) An empirical study on business analytics affordances enhancing the management of cloud computing data security. Int J Inf Manag 50 Pages 387–394, ISSN 0268–4012. https://doi.org/10.1016/j.ijinfomgt.2019.09.002
  95. Saura JR (2021) Daniel Palacios-Marqués, Domingo Ribeiro-Soriano, Using data mining techniques to explore security issues in smart living environments in Twitter, Computer Communications, Volume 179, Pages 285–295, ISSN 0140–3664. https://doi.org/10.1016/j.comcom.2021.08.021
  96. Satamraju KP, Malarkodi B (2021) A decentralized framework for device authentication and data security in the next generation internet of medical things, Computer Communications, Volume 180, Pages 146–160, ISSN 0140–3664. https://doi.org/10.1016/j.comcom.2021.09.012
  97. Sasikumar S, Sundar K, Jayakumar C, Obaidat MS, Stephan T, Hsiao K-F (2022) Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment. 121:1569–1190. Simulation Modelling Practice and Theoryhttps://doi.org/10.1016/j.simpat.2022.102651
  98. Olusola Bamisile O, Ojo N, Yimen H, Adun J, Li S, Obiora Q, Huang (2021) Comprehensive functional data analysis of china’s dynamic energy security index. Energy Rep 7:6246–6259 ISSN 2352–4847. https://doi.org/10.1016/j.egyr.2021.09.018
    Article Google Scholar
  99. Duan M et al (2022) IEEE Transactions on Parallel and Distributed Systems. 1 Nov 33(11):2661–2674. https://doi.org/10.1109/TPDS.2021.3134263. Flexible Clustered Federated Learning for Client-Level Data Distribution Shift,
  100. Ahn J, Lee Y, Kim N, Park C, Jeong J (2023) Processes Sens 23:7331. https://doi.org/10.3390/s23177331. Federated Learning for Predictive Maintenance and Anomaly Detection Using Time Series Data Distribution Shifts in Manufacturing
  101. Servetnyk M, Fung CC, Han Z (2020) Unsupervised Federated Learning for Unbalanced Data, GLOBECOM 2020–2020 IEEE Global Communications Conference, Taipei, Taiwan, pp. 1–6. https://doi.org/10.1109/GLOBECOM42002.2020.9348203
  102. Zhao B, Cui Q, Liang S, Zhai J, Hou Y, Huang X (2022) Miao pan, and Xiaofeng tao. Green concerns in federated learning over 6G. China Communications 3:50–69
  103. Dritsas E, Trigka M (2025) Federated learning for iot: A survey of techniques, challenges, and applications. J Sens Actuator Netw 14:9. https://doi.org/10.3390/jsan14010009
    Article Google Scholar
  104. Rupa C, Srivastava G, Gadekallu TR Praveen Kumar Reddy maddikunta, Sweta bhattacharya, security and privacy of UAV data using blockchain technology. J Inform Secur Appl, 55, 2020, 102670, ISSN 2214 – 2126, https://doi.org/10.1016/j.jisa.2020.102670
  105. Rjaibi W, Hammoudeh M (2020) Enhancing and simplifying data security and privacy for multitiered applications, Journal of Parallel and Distributed Computing, Volume 139, Pages 53–64, ISSN 0743–7315. https://doi.org/10.1016/j.jpdc.2020.01.006
  106. Fursan Thabit APS, Alhomdy, Abdulrazzaq HA, Al-Ahdal (2021) Prof Dr Sudhir Jagtap, A new lightweight cryptographic algorithm for enhancing data security in cloud computing, Global Transitions Proceedings, Volume 2, Issue 1, Pages 91–99, ISSN 2666-285X. https://doi.org/10.1016/j.gltp.2021.01.013
  107. Varfolomeev AA, Al-Farhani LH Blockchain Based Digital Identity Management System for Smart City Services, 2023 International Conference on Information Technology, Applied Mathematics and Statistics (ICITAMS), Al-Qadisyia, Iraq, 2023, pp. 79–85. https://doi.org/10.1109/ICITAMS57610.2023.10525393
  108. Solanki B et al Blockchain-based Decentralized Hybrid P2P Energy Trading, 2021 9th IEEE International Conference on Power Systems (ICPS), Kharagpur, India, 2021, pp. 1–5. https://doi.org/10.1109/ICPS52420.2021.9670159
  109. Pathak A, Al-Anbagi I, Hamilton HJ (2024) Blockchain-Enhanced zero knowledge Proof-Based Privacy-Preserving mutual authentication for IoT networks, in IEEE access. 12:118618–118636. https://doi.org/10.1109/ACCESS.2024.3450313
  110. Alghamdi TA, Khalid R, Javaid N (2024) A Survey of Blockchain Based Systems: Scalability Issues and Solutions, Applications and Future Challenges, in IEEE Access, vol. 12, pp. 79626–79651. https://doi.org/10.1109/ACCESS.2024.3408868
  111. Abduljalil Jaffar J, Elmedany W A systematic review of homomorphic encryption applications in Internet of Things, 6th Smart Cities Symposium (SCS 2022), Hybrid Conference, Bahrain, 2022, pp. 489–497. https://doi.org/10.1049/icp.2023.0649
  112. Jin X et al (2021) Confused-Modulo-Projection-Based Somewhat Homomorphic Encryption—Cryptosystem, Library, and Applications on Secure Smart Cities, in IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6324–6336, 15 April15. https://doi.org/10.1109/JIOT.2020.3015032
  113. Hijazi NM, Aloqaily M, Guizani M, Ouni B, Karray F (2024) Secure federated learning with fully homomorphic encryption for IoT communications. IEEE Internet Things J 11(3):4289–4300. https://doi.org/10.1109/JIOT.2023.3302065
    Article Google Scholar
  114. Jin X, Zhang H, Li X, Yu H, Liu B, Xie S, Singh AK, Li Y (2020) Confused Modulo Projection based Somewhat Homomorphic Encryption—Cryptosystem, Library and Applications on Secure Smart Cities, IEEE Internet of Things Journal, published online Aug. 7, doi: arXiv:2012.10692
  115. Prateek K, Maity S, Saxena N A Quantum Communication Based Secure Road Condition Monitoring Application in Intelligent Internet of Vehicular Things, 2022 IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022, pp. 1–6. https://doi.org/10.1109/INDICON56171.2022.10040136
  116. Ghosh U, Das D, Chatterjee P, Shetty S (2023) Quantum-Enabled Blockchain for Data Processing and Management in Smart Cities, 2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Boston, MA, USA, pp. 425–430. https://doi.org/10.1109/WoWMoM57956.2023.00075
  117. Chawla D, Mehra PS (2025) Performance analysis of the quantum schemes in the Resource-Constrained IoT network. In: Nanda P, Srivastava S, Verma VK, Vyas P (eds) Intelligent system and data analysis. SSIC 2023. Smart innovation, systems and technologies, vol 398. Springer, Singapore. https://doi.org/10.1007/978-981-97-5200-3_30
    Chapter Google Scholar
  118. Bera B, Das AK, Sikdar B (2025) Securing Next-Generation Quantum IoT Applications using Quantum Key Distribution, in IEEE Internet of Things Magazine, vol. 8, no. 1, pp. 50–56, January https://doi.org/10.1109/IOTM.001.2400059
  119. Ahmed A, Abd EL-L, Abd-El-Atty B, Venegas-Andraca SE (2019) Wojciech mazurczyk, efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Generation Comput Syst 100:893–906. https://doi.org/10.1016/j.future.2019.05.053. ISSN 0167-739X
    Article Google Scholar
  120. Yaqi Gong A, Schroeder (2022) A systematic literature review of data privacy and security research on smart tourism, Tourism Management Perspectives, Volume 44, 101019, ISSN 2211–9736. https://doi.org/10.1016/j.tmp.2022.101019
  121. Tao Lin P, Wu F, Gao (2022) Information security of flowmeter communication network based on multi-sensor data fusion. Energy Rep 8 Pages 12643–12652, ISSN 2352–4847. https://doi.org/10.1016/j.egyr.2022.09.072
  122. Junjun Guo L, Wang (2020) Learning to upgrade internet information security and protection strategy in big data era, Computer Communications, Volume 160, Pages 150–157, ISSN 0140–3664. https://doi.org/10.1016/j.comcom.2020.05.043
  123. Fursan Thabit S, Alhomdy S, Jagtap (2021) A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int J Intell Networks 2 Pages 18–33, ISSN 2666–6030. https://doi.org/10.1016/j.ijin.2021.03.001
  124. Saheb T (2023) Ethically contentious aspects of artificial intelligence surveillance: a social science perspective. AI Ethics 3:369–379. https://doi.org/10.1007/s43681-022-00196-y
    Article Google Scholar
  125. Ismagilova E, Hughes L, Rana NP et al (2022) Security, privacy and risks within smart cities: literature review and development of a smart City interaction framework. Inf Syst Front 24:393–414. https://doi.org/10.1007/s10796-020-10044-1
    Article Google Scholar
  126. Ziosi M, Hewitt B, Juneja P et al (2024) Smart cities: reviewing the debate about their ethical implications. AI Soc 39:1185–1200. https://doi.org/10.1007/s00146-022-01558-0
    Article Google Scholar
  127. Gesmann-Nuissl D, Tacke I, Olschewski B (2024) ELSA for the smart city: ethical, legal, and social technologization of homes, cities, and societies through standardized ELSA-Assessment—A legal point of view. DISO 3:63. https://doi.org/10.1007/s44206-024-00153-8
    Article Google Scholar
  128. Abbas SR, Abbas Z, Zahir A, Lee SW (2024) Federated learning in smart healthcare: A comprehensive review on privacy, security, and predictive analytics with IoT integration. Healthcare 12:2587. https://doi.org/10.3390/healthcare12242587
    Article Google Scholar
  129. Dhirani LL, Mukhtiar N, Chowdhry BS, Newe T (2023) Ethical dilemmas and privacy issues in emerging technologies: A review. Sens (Basel) 23(3):1151. https://doi.org/10.3390/s23031151PMID: 36772190; PMCID: PMC9921682
    Article Google Scholar
  130. Gstrein OJ (2024) Data autonomy: beyond personal data abuse, sphere transgression, and datafied gentrification in smart cities. Ethics Inf Technol 26:61. https://doi.org/10.1007/s10676-024-09799-x
    Article Google Scholar
  131. Zimmermann V (2023) Smart cities as a testbed for experimenting with humans? - Applying psychological ethical guidelines to smart City interventions. Ethics Inf Technol 25:54. https://doi.org/10.1007/s10676-023-09729-3
    Article Google Scholar
  132. Rawindaran N (2023) Legal considerations and ethical challenges of artificial intelligence on internet of things and smart cities. In: Hewage C, Rahulamathavan Y, Ratnayake D (eds) Data protection in a Post-Pandemic society. Springer, Cham. https://doi.org/10.1007/978-3-031-34006-2_8
    Chapter Google Scholar
  133. Sei Y (2024) Privacy-Preserving data collection and analysis for smart cities. In: Murakami Y, Kimura K (eds) Human-Centered services computing for smart cities. Springer, Singapore. https://doi.org/10.1007/978-981-97-0779-9_5
    Chapter Google Scholar
  134. Jia D, Yang G, Huang M et al (2023) An efficient privacy-preserving blockchain storage method for internet of things environment. World Wide Web 26:2709–2726. https://doi.org/10.1007/s11280-023-01172-0
    Article Google Scholar
  135. Zhu H, Chau SC-K, Guarddin G, Liang W (Nov. 2022) Integrating IoT-Sensing and crowdsensing with privacy: Privacy-Preserving hybrid sensing for smart cities. ACM Trans Internet Things 3(4):, article 31, 1–30. https://doi.org/10.48550/arXiv.2206.14466
  136. Padma A, Ramaiah M (2024) Blockchain Based an Efficient and Secure Privacy Preserved Framework for Smart Cities, in IEEE Access, vol. 12, pp. 21985–22002. https://doi.org/10.1109/ACCESS.2024.3364078
  137. Mahin Mohammadi R, Rawassizadeh A, Sheikhtaheri A consumer-centered security framework for sharing health data in social networks. J Inform Secur Appl, 69, 2022, 103303, ISSN 2214 – 2126, https://doi.org/10.1016/j.jisa.2022.103303
  138. Mahin Mohammadi RQ, Li X, Wang P, Wang W, Zhang J, Yin FARDA A fog-based anonymous reward data aggregation security scheme in smart buildings, Building and environment, 225, 2022, 109578, ISSN 0360–1323, https://doi.org/10.1016/j.buildenv.2022.109578
  139. Awassizadeh A, Sheikhtaheri (2022) A consumer-centered security framework for sharing health data in social networks. J Inform Secur Appl 69 103303, ISSN 2214 – 2126. https://doi.org/10.1016/j.jisa.2022.103303
  140. Shabana Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil, Cryptographic Data Security for Reliable Wireless Sensor Network (2023) Alexandria Eng J 72 Pages 37–50, ISSN 1110 – 0168. https://doi.org/10.1016/j.aej.2023.03.061
  141. Basha US, Gupta SK, Alawad W, Kim SK, Bharany S (2024) Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol, Computers, Materials and Continua, Volume 79, Issue 2, Pages 3397–3416, ISSN 1546–2218. https://doi.org/10.32604/cmc.2024.046265
  142. Li D, Gong Y The design of power grid data management system based on blockchain technology and construction of system security evaluation model. Energy Rep, 8, Supplement 7, 2022, Pages 466–479, ISSN 2352–4847, https://doi.org/10.1016/j.egyr.2022.05.277
  143. Wang Y et al (2024) Knowledge and Data Dual-Driven Fault Diagnosis in Industrial Scenarios: A Survey, in IEEE Internet of Things Journal, vol. 11, no. 11, pp. 19256–19277, 1 June1. https://doi.org/10.1109/JIOT.2024.3387538
  144. Heiyanthuduwage SR, Altas I, Bewong M, Islam MZ, Deho OB (2024) Decision Trees in Federated Learning: Current State and Future Opportunities, in IEEE Access, vol. 12, pp. 127943–127965. https://doi.org/10.1109/ACCESS.2024.3440998
  145. Gkontzis AF, Kotsiantis S, Feretzakis G, Verykios VS (2024) Enhancing urban resilience: smart city data analyses, forecasts, and digital twin techniques at the neighborhood level. Future Internet 16(2):47. https://doi.org/10.3390/fi16020047
    Article Google Scholar
  146. Premkumar R, Sathya Priya S (2022) Service constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain, measurement, vol 24. Sensors, pp 2665–9174. https://doi.org/10.1016/j.measen.2022.100486
  147. Hui, Gao, Design of Network Data Information Security Monitoring System Based on Big Data Technology (2023) Procedia Comput Sci 228 Pages 348–355, ISSN 1877 – 0509. https://doi.org/10.1016/j.procs.2023.11.040
  148. Sindjoung MLF, Velempini M Clémentin Tayou Djamegni, A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network, Array, Volume 19, 2023, 100304, ISSN 2590-0056. https://doi.org/10.1016/j.array.2023.100304
  149. Wang C, Zhang J, Xu M, Zhang H, Han W, Security (2022) Volume 121, 102848, ISSN 0167–4048, https://doi.org/10.1016/j.cose.2022.102848
  150. Olufemi OO (2023) Odeyemi Kehinde Oluwasesan, An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things, Internet of Things, Volume 23, 100862, ISSN 2542–6605. https://doi.org/10.1016/j.iot.2023.100862
  151. Juntao Du H, Gu Z, Shen M, Song M, Vardanyan (2024) Assessing regional energy security characteristics: evidence from Chinese province-level data. Energy Econ 140:0140–9883. https://doi.org/10.1016/j.eneco.2024.107964
    Article Google Scholar
  152. Rehman KU, Andleeb S, Ashfaq M, Akram N, Akram MW (2023) Blockchain-enabled smart agriculture: enhancing data-driven decision making and ensuring food security. J Clean Prod 427 138900:0959–6526. https://doi.org/10.1016/j.jclepro.2023.138900
    Article Google Scholar
  153. Rai HM, Shukla KK, Tightiz L, Padmanaban S Enhancing data security and privacy in energy applications: Integrating IoT and blockchain technologies, Heliyon, Volume 10, Issue 19, 2024, e38917, ISSN 2405–8440. https://doi.org/10.1016/j.heliyon.2024.e38917
  154. Ziwei, Song (2024) Personal data security and stock crash risk: Evidence from China’s Cybersecurity Law, China Journal of Accounting Research, Volume 17, Issue 4, 100393, ISSN 1755–3091. https://doi.org/10.1016/j.cjar.2024.100393
  155. Luo X, He L, Wei X, Zhu M, Li Z Security requirement classification of electricity trading data based on hierarchical fuzzy Petri network, Energy Rep, 9, Supplement 7, 2023, Pages 189–199, ISSN 2352–4847, https://doi.org/10.1016/j.egyr.2023.04.079
  156. Satilmiş H, Akleylek S, Tok ZY (2024) A Systematic Literature Review on Host-Based Intrusion Detection Systems, in IEEE Access, vol. 12, pp. 27237–27266. https://doi.org/10.1109/ACCESS.2024.3367004
  157. Masciari E, Umair A, Ullah MH (2024) A Systematic Literature Review on AI-Based Recommendation Systems and Their Ethical Considerations, in IEEE Access, vol. 12, pp. 121223–121241. https://doi.org/10.1109/ACCESS.2024.3451054
  158. Prasad Vangapandu T, Surendra C, Ramineni M, Radha Madhavi R, Hari, Kishore (2024) Knowl Based Syst 306:0950–7051. https://doi.org/10.1016/j.knosys.2024.112653. Hybridized data encoding based encryption and Diffie Hellman decryption for security enhancement
  159. Tian Z, Han M, Jiang C Research on platform data security governance strategy based on three-party evolutionary game, Heliyon, Volume 10, Issue 17, 2024, e36391, ISSN 2405–8440. https://doi.org/10.1016/j.heliyon.2024.e36391
  160. Ranganatha Rao B, Sujatha B (2023) A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security. Measurement: Sens 29 100870:2665–9174. https://doi.org/10.1016/j.measen.2023.100870
    Article Google Scholar
  161. Zhang, Zheng (2024) Design and application of data security privacy protection technology in dance action sequence arrangement and display system, vol 33. Sensors, Measurement, pp 2665–9174. https://doi.org/10.1016/j.measen.2024.101178
    Book Google Scholar
  162. Gang Han L, Li B, Qin D, Zheng (2024) Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT, Journal of King Saud University - Computer and Information Sciences, Volume 36, Issue 6, 102105, ISSN 1319–1578. https://doi.org/10.1016/j.jksuci.2024.102105
  163. Marialida Farah S, Helou E, Raad EE, Helou (2024) Data protection and information security in biomedical research: A sequential explanatory mixed study. Int J Med Informatics 192:1386–5056. https://doi.org/10.1016/j.ijmedinf.2024.105635
    Article Google Scholar
  164. Shameer Mohammed S, Nanthini N, Bala Krishna IV, Srinivas M, Rajagopal M, Ashok Kumar (2023) A new lightweight data security system for data security in the cloud computing, Measurement: Sensors, Volume 29, 100856, ISSN 2665–9174, https://doi.org/10.1016/j.measen.2023.100856
  165. Xuejie, Niu Exploration on human resource management and prediction model of data-driven information security in Internet of Things, Heliyon, Volume 10, Issue 9, 2024, e29582, ISSN 2405–8440. https://doi.org/10.1016/j.heliyon.2024.e29582
  166. Manjur Kolhar SM, Aldossary, Continua (2023) Volume 77, Issue 3, Pages 2857–2879, ISSN 1546–2218, https://doi.org/10.32604/cmc.2023.042726
  167. Abdillah Abdillah I, Widianingsih RA, Buchari H, Nurasa Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia, Array, Volume 21, 2024, 100336, ISSN 2590-0056. https://doi.org/10.1016/j.array.2024.100336
  168. Zhang X, Cui L, Shen W, Wang Y (2024) Design and Implementation of Intelligent Data Security Risk Assessment and Management System, Procedia Computer Science, Volume 243, Pages 148–155, ISSN 1877 – 0509, https://doi.org/10.1016/j.procs.2024.09.020
  169. Bassim M, Salih, Omer K, Jasim Mohammad (2024) Cloud Data Leakage, Security, Privacy Issues and Challenges: Review, Procedia Computer Science, Volume 242, Pages 592–601, ISSN 1877 – 0509. https://doi.org/10.1016/j.procs.2024.08.113

Download references