A systematic literature review on data privacy and security techniques in smart cities: trends, gaps, and future directions (original) (raw)
References
Lingfeng Qu M, Li Y, Sun S, Su Y, Liu L, Zhang (2024) Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer, Journal of King Saud University - Computer and Information Sciences, Volume 36, Issue 1, 101914, ISSN 1319–1578. https://doi.org/10.1016/j.jksuci.2024.101914
Qiao Liu Q, Han G, Luo J, Cao H, Li Y, Wang (2024) Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles, Microprocessors and Microsystems, Volume 104, 104965, ISSN 0141–9331. https://doi.org/10.1016/j.micpro.2023.104965
Ji X, Chen Y, Yang W, Wu Q Security and data encryption effect of high ciphertext based on improved RC6 algorithm for WSN, results in physics, 53, 2023, 106959, ISSN 2211–3797, https://doi.org/10.1016/j.rinp.2023.106959
Mohanad A, Mohammed, Hala B, Abdul Wahab (2023) Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption, CMES - Computer Modeling in Engineering and Sciences, Volume 138, Issue 2, Pages 1731–1748, ISSN 1526 – 1492. https://doi.org/10.32604/cmes.2023.030528
Chen A, Yu S, Yang X, Huang D, Ren Y IoT data security in outsourced databases: A survey of verifiable database, Heliyon, Volume 10, Issue 7, 2024, e28117, ISSN 2405–8440. https://doi.org/10.1016/j.heliyon.2024.e28117
Saifur Rahman S, Pal S, Mittal T, Chawla C, Karmakar SYN-GAN A robust intrusion detection system using GAN-based synthetic data for IoT security, internet of things, 26, 2024, 101212, ISSN 2542–6605, https://doi.org/10.1016/j.iot.2024.101212
Bui T-D, Tseng J-W, Tsai FM, Ali MH, Ming K, Lim M-L, Tseng Energy security challenges and opportunities in the carbon neutrality context: A hierarchical model through systematic data-driven analysis, renewable and sustainable energy reviews, 187, 2023, 113710, ISSN 1364 – 0321, https://doi.org/10.1016/j.rser.2023.113710
Haoran Ni Z, Guo C, Li S, Dou C, Yao T, Baker (2022) Network Coding-based resilient routing for maintaining data security and availability in Software-Defined networks. J Netw Comput Appl 205:1084–8045. https://doi.org/10.1016/j.jnca.2022.103372 Article Google Scholar
Reshi A, Sholla S (2023) The blockchain conundrum: An in-depth examination of challenges, contributing technologies, and alternatives, Concurrency and Computation: Practice and Experience, Dec. 19. https://doi.org/10.1002/cpe.7987
Sharmila Ghosh A, Saha T, Pal AK, Jha (2024) Procedia Comput Sci 235 Pages 1024–1033, ISSN 1877 – 0509. https://doi.org/10.1016/j.procs.2024.04.097. A comparative analysis of chaos theory based medical image steganography to enhance data security
Maurice Osewe L, Aijun H, Jiqin (2023) Sustainable intensification and food security: A panel data assessment of the smallholder maize farmers in Uganda, Global Food Security, Volume 39, 100724, ISSN 2211–9124. https://doi.org/10.1016/j.gfs.2023.100724
Judy Flavia B, Balika J, Chelliah (2023) Artificial Lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments. Computers Secur 135 103475:0167–4048. https://doi.org/10.1016/j.cose.2023.103475 Article Google Scholar
Saima Kanwal F, Tao A, Almogren AU, Rehman R, Taj A, Radwan, Sciences (2022) Volume 134, Issue 1, Pages 201–219, ISSN 1526 – 1492, https://doi.org/10.32604/cmes.2022.020255
Alhitmi HK, Mardiah A, Al-Sulaiti KI, Abbas J (2024) Data security and privacy concerns of AI-driven marketing in the context of economics and business field: an exploration into possible solutions. Cogent Bus Manage 11(1). https://doi.org/10.1080/23311975.2024.2393743
Oyewole AT, Oguejiofor BB, Eneh NE, THEIR IMPACT ON FINANCIAL TECHNOLOGY COMPANIES: A REVIEW (2024) Chidiogo Uzoamaka Akpuokwe, & Seun Solomon Bakare. Comput Sci IT Res J 5(3):628–650. https://doi.org/10.51594/csitrj.v5i3.911. DATA PRIVACY LAWS AND
Ray RK, Chowdhury FR, Hasan MR (2024) Blockchain applications in retail cybersecurity: enhancing supply chain integrity, secure transactions, and data protection. J Bus Manage Stud 6(1):206–214. https://doi.org/10.32996/jbms.2024.6.1.13 Article Google Scholar
Su G, Wang J, Xu X, Wang Y, Wang C (2024) The utilization of homomorphic encryption technology grounded on artificial intelligence for privacy preservation. Int J Comput Sci Inform Technol 2(1):52–58. https://doi.org/10.62051/ijcsit.v2n1.07 Article Google Scholar
PRIVACY: ADVANCED RISK MANAGEMENT STRATEGIES FOR PRODUCT DEVELOPMENT IN THE U.S. Computer Science & (2024) IT Res J 5(4):878–891. https://doi.org/10.51594/csitrj.v5i4.1047. PROACTIVE
Wiryawan D, Ramadhan W, Krisnata F, Dhiya’ F, Ulhaq Data Security Framework with Cognitive Theory on Higher Education, 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS), Manama, Bahrain, 2024, pp. 263–268. https://doi.org/10.1109/ICETSIS61505.2024.10459503
Abdi AH et al (2024) Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions, in IEEE Access, vol. 12, pp. 69941–69980. https://doi.org/10.1109/ACCESS.2024.3393548
Albshaier L, Budokhi A, Aljughaiman A (2024) A Review of Security Issues When Integrating IoT With Cloud Computing and Blockchain, in IEEE Access, vol. 12, pp. 109560–109595. https://doi.org/10.1109/ACCESS.2024.3435845
Mishall Al-Zubaidie RA, Muhajjar (2024) Procedia Comput Sci 237 Pages 43–52, ISSN 1877 – 0509. https://doi.org/10.1016/j.procs.2024.05.078. Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors
Adam M, Hammoudeh M, Alrawashdeh R, Alsulaimy B (2024) A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems, in IEEE Access, vol. 12, pp. 57128–57149. https://doi.org/10.1109/ACCESS.2024.3382709
Setijadi Prihatmanto A, Andrian R, Danar Sunindyo W, Sutriadi R (2024) Transforming Public Services: A Systematic Review of Smart Government Frameworks, Architectures, and Implementation Challenges, in IEEE Access, vol. 12, pp. 135799–135810. https://doi.org/10.1109/ACCESS.2024.3450907
Naseer A, Shmoon M, Shakeel T, Ur Rehman S, Ahmad A, Gruhn V (2024) A Systematic Literature Review of the IoT in Agriculture—Global Adoption, Innovations, Security, and Privacy Challenges, in IEEE Access, vol. 12, pp. 60986–61021. https://doi.org/10.1109/ACCESS.2024.3394617
Brée T, Karger E, Ahlemann F (2024) Shaping the Future of Data Ecosystem Research—What Is Still Missing? in IEEE Access, vol. 12, pp. 103162–103175. https://doi.org/10.1109/ACCESS.2024.3432969
Muniswamy A, Rathi R (2024) A Detailed Review on Enhancing the Security in Internet of Things-Based Smart City Environment Using Machine Learning Algorithms, in IEEE Access, vol. 12, pp. 120389–120413. https://doi.org/10.1109/ACCESS.2024.3450180
Bhatt S, Bhushan B, Srivastava T, Anoop VS (2023) Post-Quantum cryptographic schemes for security enhancement in 5G and B5G (Beyond 5G) cellular networks. In: Bhushan B, Sharma SK, Kumar R, Priyadarshini I (eds) 5G and beyond. Springer Tracts in Electrical and Electronics Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-99-3668-7_12 Chapter Google Scholar
Yang Z, Alfauri H, Farkiani B, Jain R, Pietro RD, Erbad A (Secondquarter 2024) A survey and comparison of Post-Quantum and quantum blockchains. IEEE Commun Surv Tutorials 26(2):967–1002. https://doi.org/10.1109/COMST.2023.3325761
Pulido-Gaytan B, Tchernykh A, Cortés-Mendoza JM et al (2021) Privacy-preserving neural networks with homomorphic encryption: challenges and opportunities. Peer-to-Peer Netw. Appl 14:1666–1691. https://doi.org/10.1007/s12083-021-01076-8 Article Google Scholar
Amin Almaiah M, Ali A, Alkhdour T, Lutfi A (2024) Security Risk and Breach Detection Approach Based Blockchain for Medical Applications, in IEEE Access, vol. 12, pp. 171876–171896. https://doi.org/10.1109/ACCESS.2024.3487217
Liang Luo L, Xing G, Levitin (2019) Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks, Reliability Engineering & System Safety, Volume 192, 106265, ISSN 0951–8320. https://doi.org/10.1016/j.ress.2018.09.014
Akshatha PS, Dilip Kumar SM (2023) MQTT and blockchain sharding: An approach to user-controlled data access with improved security and efficiency, Blockchain: Research and Applications, Volume 4, Issue 4, 100158, ISSN 2096–7209. https://doi.org/10.1016/j.bcra.2023.100158
Isma’ila UA, Danyaro KU, Muazu AA, Maiwada UD (2024) Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices, in IEEE Access, vol. 12, pp. 30941–30961. https://doi.org/10.1109/ACCESS.2024.3369915
Yuting Yang Y, Lu G, Mei (2023) A federated learning based approach for predicting landslide displacement considering data security. Future Generation Comput Syst 149 Pages 184–199, ISSN 0167-739X. https://doi.org/10.1016/j.future.2023.07.021
Rawat SS, Alotaibi Y, Malsa N, Gupta V (2023) Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology, Computers, Materials and Continua, Volume 76, Issue 2, Pages 1797–1815, ISSN 1546–2218. https://doi.org/10.32604/cmc.2023.039381
Tian H, Jian Y, Ge X (2022) Blockchain-based AMI framework for data security and privacy protection, Sustainable Energy, Grids and Networks, Volume 32, 100807, ISSN 2352–4677. https://doi.org/10.1016/j.segan.2022.100807
Mwungu CM, Shikuku KM, Atibo C, Mwongera C Survey-based data on food security, nutrition and agricultural production shocks among rural farming households in Northern uganda, data in brief, 23, 2019, 103818, ISSN 2352–3409, https://doi.org/10.1016/j.dib.2019.103818
Lidia Ogiela U, Ogiela (2019) Cognitive and biologically cryptographic protocols for data security. Cogn Syst Res 56 Pages 1–6, ISSN 1389 – 0417. https://doi.org/10.1016/j.cogsys.2019.02.008
Umapathy B, Kalpana G, A novel symmetric cryptographic method to design block complexity for data security, Computers and Electrical Engineering, Volume 104, Part B (2022) 108467, ISSN 0045-7906. https://doi.org/10.1016/j.compeleceng.2022.108467
Li Y, Zhang Q, Zhang L, Ye Y, Zhang R, Gu X, Liu R, Zhu H AIPE-active Ir(Ⅲ) complexes with reversible piezochromic behavior and its application for data security protection. J Organomet Chem, 930, 2020, 121595, ISSN 0022-328X, https://doi.org/10.1016/j.jorganchem.2020.121595
Por LY, Ng IO, Chen Y-L, Yang J, Ku CS (2024) A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords, in IEEE Access, vol. 12, pp. 53408–53423. https://doi.org/10.1109/ACCESS.2024.3373662
Pratima Sharma MD, Borah S, Namasudra (2021) Improving security of medical big data by using Blockchain technology, Computers & Electrical Engineering, Volume 96, Part A, 107529, ISSN 0045-7906. https://doi.org/10.1016/j.compeleceng.2021.107529
Tao, Lu (2022) Network security risk assessment of football matches based on data mining technology, Optik, Volume 270, 169945, ISSN 0030-4026. https://doi.org/10.1016/j.ijleo.2022.169945
Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Netw Comput Appl 134 Pages 26–39, ISSN 1084–8045. https://doi.org/10.1016/j.jnca.2019.02.015
Akalanka Mailewa S, Mengel L, Gittner H, Khan Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers, Array, Volume 15, 2022, 100236, ISSN 2590-0056. https://doi.org/10.1016/j.array.2022.100236
Yudhistira Nugraha A, Martin (2021) Towards a framework for trustworthy data security level agreement in cloud procurement, Computers & Security, Volume 106, 102266, ISSN 0167–4048. https://doi.org/10.1016/j.cose.2021.102266
Anjali Yeole DR, Kalbande A, Sharma (2019) Security of 6LoWPAN IoT Networks in Hospitals for Medical Data Exchange, Procedia Computer Science, Volume 152, Pages 212–221, ISSN 1877 – 0509, https://doi.org/10.1016/j.procs.2019.05.045
Turet JG, Costa APCS Hybrid methodology for analysis of structured and unstructured data to support decision-making in public security, Data Knowl Eng, 141, 2022, 102056, ISSN 0169-023X, https://doi.org/10.1016/j.datak.2022.102056
Elahi H, Wang G, Jiang W, Bartel A, Le Traon Y (April 2024) A qualitative study of app acquisition and management. IEEE Trans Comput Social Syst 11(2):1907–1925. https://doi.org/10.1109/TCSS.2023.3288562
Chen X (2020) A security integration model for private data of intelligent mobile communication based on edge computing, Computer Communications, Volume 162, Pages 204–211, ISSN 0140–3664. https://doi.org/10.1016/j.comcom.2020.08.026
Alaoui IE, Gahi Y, Network Security Strategies in Big Data Context, Science PC (2020) Volume 175, Pages 730–736, ISSN 1877 – 0509, https://doi.org/10.1016/j.procs.2020.07.108
Abiodun OI, Alawida M, Omolara AE, Alabdulatif A (2022) Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey, Journal of King Saud University - Computer and Information Sciences, Volume 34, Issue 10, Part B, Pages 10217–10245, ISSN 1319–1578. https://doi.org/10.1016/j.jksuci.2022.10.018
Kishori Kasat D, Leela Rani B, Khan AJ, Kirubakaran MK, Malathi P A novel security framework for healthcare data through IOT sensors, measurement: sensors, 24, 2022, 100535, ISSN 2665–9174, https://doi.org/10.1016/j.measen.2022.100535
Andrea, Babbs (2020) How to leverage data security in a post-Covid world, Computer Fraud & Security, Volume Issue 10, 2020, Pages 8–11, ISSN 1361–3723. https://doi.org/10.1016/S1361-3723(20)30107-X
Claudio A, Ardagna V, Bellandi E, Damiani M, Bezzi C, Hebert Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists, Comput Electr Eng, 93, 2021, 107215, ISSN 0045-7906, https://doi.org/10.1016/j.compeleceng.2021.107215
Wang W, Mahakala KR, Gupta A, Hussein N, Wang Y (2019) Data on security requirements in open-source software projects, Data in Brief, Volume 25, 103590, ISSN 2352–3409. https://doi.org/10.1016/j.dib.2018.12.029
Jie Chen L, Ramanathan M, Alazab (2021) Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities. Microprocess Microsyst 81:0141–9331. https://doi.org/10.1016/j.micpro.2020.103722 Article Google Scholar
Hong Lei J, Li S, Li M, Huang J, Cheng Y, Bai X, Luo C, Liu, Continua (2022) Volume 73, Issue 3, Pages 5687–5702, ISSN 1546–2218, https://doi.org/10.32604/cmc.2022.030995
Mehrbakhsh Nilashi RA, Abumalloh S, Samad M, Alrizq S, Alyami H, Abosaq A, Alghamdi (2022) Noor Adelyna Mohammed Akib, Factors impacting customer purchase intention of smart home security systems: Social data analysis using machine learning techniques, Technology in Society, Volume 71, 102118, ISSN 0160-791X. https://doi.org/10.1016/j.techsoc.2022.102118
Charlene, Bunting (2019) Cloud security: how to protect critical data and stay productive, Network Security, Volume Issue 9, 2019, Pages 18–19, ISSN 1353–4858. https://doi.org/10.1016/S1353-4858(19)30110-2
Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E (2020) Comput Commun 151:495–517. https://doi.org/10.1016/j.comcom.2020.01.016. Abdul Salam Mohamed Nainar, Nazihah Md Akim, Muhammad Imran, Deep learning and big data technologies for IoT security
Ibrahim A, Elgendy W, Zhang Y-C, Tian K, Li (2019) Resource allocation and computation offloading with data security for mobile edge computing. Future Generation Comput Syst 100 Pages 531–541, ISSN 0167-739X. https://doi.org/10.1016/j.future.2019.05.037
Fu Y, Chen H, Zheng Q, Kantola ZYR, Jing X, Cao J, Li H (2020) J Netw Comput Appl 155:1084–8045. https://doi.org/10.1016/j.jnca.2020.102549., An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks
Wei Ren X, Wan (2021) Pengcheng Gan, A double-blockchain solution for agricultural sampled data security in Internet of Things network, Future Generation Computer Systems, Volume 117, Pages 453–461, ISSN 0167-739X. https://doi.org/10.1016/j.future.2020.12.007
Leila, Powell (2020) How data can be the lingua franca for security and IT, Network Security, Volume Issue 6, 2020, Pages 6–7, ISSN 1353–4858. https://doi.org/10.1016/S1353-4858(20)30065-9
Muhammad Adil MK, Khan (2021) Sustainable Cities Soc 75:2210–6707. https://doi.org/10.1016/j.scs.2021.103311. Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions
Sandeep Pirbhulal OW, Samuel W, Wu AK, Sangaiah G, Li (2019) Future Generation Comput Syst 95 Pages 382–391, ISSN 0167-739X. https://doi.org/10.1016/j.future.2019.01.008. A joint resource-aware and medical data security framework for wearable healthcare systems
Zyoud B, Lebai Lutfi S (2024) The role of information security culture in zero trust adoption: insights from UAE organizations, in IEEE access. 12:72420–72444. https://doi.org/10.1109/ACCESS.2024.3402341
Velasco FA, Palomares JM, Olivares J Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs, Comput Netw, 199, 2021, 108470, ISSN 1389 – 1286, https://doi.org/10.1016/j.comnet.2021.108470
Amoon M, Altameem T, Altameem A (2020) Internet of things sensor assisted security and quality analysis for health care data sets using artificial intelligent based heuristic health management system, Measurement, Volume 161, 107861, ISSN 0263–2241. https://doi.org/10.1016/j.measurement.2020.107861
Kautsarina AN, Hidayanto B, Anggorojati Z, Abidin K, Phusavat (2020) Data modeling positive security behavior implementation among smart device users in Indonesia: A partial least squares structural equation modeling approach (PLS-SEM), Data in Brief, Volume 30, 105588, ISSN 2352–3409. https://doi.org/10.1016/j.dib.2020.105588
Lanre Amodu O, Odiboh S, Usaini D, Yartey T, Ekanem (2019) Data Brief 27 104663:2352–3409. https://doi.org/10.1016/j.dib.2019.104663. Data on security implications of the adoption of Internet of Things by public relations professionals
Tatiana M, Kanner AM, Kanner AV, Epishkina (2021) Algorithm for Optimal and Complete Testing of Software and Hardware Data Security Tools, Procedia Computer Science, Volume 190, Pages 408–413, ISSN 1877 – 0509, https://doi.org/10.1016/j.procs.2021.06.049
Zhiying Wang N, Wang X, Su S, Ge (2020) An empirical study on business analytics affordances enhancing the management of cloud computing data security. Int J Inf Manag 50 Pages 387–394, ISSN 0268–4012. https://doi.org/10.1016/j.ijinfomgt.2019.09.002
Saura JR (2021) Daniel Palacios-Marqués, Domingo Ribeiro-Soriano, Using data mining techniques to explore security issues in smart living environments in Twitter, Computer Communications, Volume 179, Pages 285–295, ISSN 0140–3664. https://doi.org/10.1016/j.comcom.2021.08.021
Satamraju KP, Malarkodi B (2021) A decentralized framework for device authentication and data security in the next generation internet of medical things, Computer Communications, Volume 180, Pages 146–160, ISSN 0140–3664. https://doi.org/10.1016/j.comcom.2021.09.012
Sasikumar S, Sundar K, Jayakumar C, Obaidat MS, Stephan T, Hsiao K-F (2022) Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment. 121:1569–1190. Simulation Modelling Practice and Theoryhttps://doi.org/10.1016/j.simpat.2022.102651
Olusola Bamisile O, Ojo N, Yimen H, Adun J, Li S, Obiora Q, Huang (2021) Comprehensive functional data analysis of china’s dynamic energy security index. Energy Rep 7:6246–6259 ISSN 2352–4847. https://doi.org/10.1016/j.egyr.2021.09.018 Article Google Scholar
Duan M et al (2022) IEEE Transactions on Parallel and Distributed Systems. 1 Nov 33(11):2661–2674. https://doi.org/10.1109/TPDS.2021.3134263. Flexible Clustered Federated Learning for Client-Level Data Distribution Shift,
Ahn J, Lee Y, Kim N, Park C, Jeong J (2023) Processes Sens 23:7331. https://doi.org/10.3390/s23177331. Federated Learning for Predictive Maintenance and Anomaly Detection Using Time Series Data Distribution Shifts in Manufacturing
Servetnyk M, Fung CC, Han Z (2020) Unsupervised Federated Learning for Unbalanced Data, GLOBECOM 2020–2020 IEEE Global Communications Conference, Taipei, Taiwan, pp. 1–6. https://doi.org/10.1109/GLOBECOM42002.2020.9348203
Zhao B, Cui Q, Liang S, Zhai J, Hou Y, Huang X (2022) Miao pan, and Xiaofeng tao. Green concerns in federated learning over 6G. China Communications 3:50–69
Rupa C, Srivastava G, Gadekallu TR Praveen Kumar Reddy maddikunta, Sweta bhattacharya, security and privacy of UAV data using blockchain technology. J Inform Secur Appl, 55, 2020, 102670, ISSN 2214 – 2126, https://doi.org/10.1016/j.jisa.2020.102670
Rjaibi W, Hammoudeh M (2020) Enhancing and simplifying data security and privacy for multitiered applications, Journal of Parallel and Distributed Computing, Volume 139, Pages 53–64, ISSN 0743–7315. https://doi.org/10.1016/j.jpdc.2020.01.006
Fursan Thabit APS, Alhomdy, Abdulrazzaq HA, Al-Ahdal (2021) Prof Dr Sudhir Jagtap, A new lightweight cryptographic algorithm for enhancing data security in cloud computing, Global Transitions Proceedings, Volume 2, Issue 1, Pages 91–99, ISSN 2666-285X. https://doi.org/10.1016/j.gltp.2021.01.013
Varfolomeev AA, Al-Farhani LH Blockchain Based Digital Identity Management System for Smart City Services, 2023 International Conference on Information Technology, Applied Mathematics and Statistics (ICITAMS), Al-Qadisyia, Iraq, 2023, pp. 79–85. https://doi.org/10.1109/ICITAMS57610.2023.10525393
Solanki B et al Blockchain-based Decentralized Hybrid P2P Energy Trading, 2021 9th IEEE International Conference on Power Systems (ICPS), Kharagpur, India, 2021, pp. 1–5. https://doi.org/10.1109/ICPS52420.2021.9670159
Pathak A, Al-Anbagi I, Hamilton HJ (2024) Blockchain-Enhanced zero knowledge Proof-Based Privacy-Preserving mutual authentication for IoT networks, in IEEE access. 12:118618–118636. https://doi.org/10.1109/ACCESS.2024.3450313
Alghamdi TA, Khalid R, Javaid N (2024) A Survey of Blockchain Based Systems: Scalability Issues and Solutions, Applications and Future Challenges, in IEEE Access, vol. 12, pp. 79626–79651. https://doi.org/10.1109/ACCESS.2024.3408868
Abduljalil Jaffar J, Elmedany W A systematic review of homomorphic encryption applications in Internet of Things, 6th Smart Cities Symposium (SCS 2022), Hybrid Conference, Bahrain, 2022, pp. 489–497. https://doi.org/10.1049/icp.2023.0649
Jin X et al (2021) Confused-Modulo-Projection-Based Somewhat Homomorphic Encryption—Cryptosystem, Library, and Applications on Secure Smart Cities, in IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6324–6336, 15 April15. https://doi.org/10.1109/JIOT.2020.3015032
Jin X, Zhang H, Li X, Yu H, Liu B, Xie S, Singh AK, Li Y (2020) Confused Modulo Projection based Somewhat Homomorphic Encryption—Cryptosystem, Library and Applications on Secure Smart Cities, IEEE Internet of Things Journal, published online Aug. 7, doi: arXiv:2012.10692
Prateek K, Maity S, Saxena N A Quantum Communication Based Secure Road Condition Monitoring Application in Intelligent Internet of Vehicular Things, 2022 IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022, pp. 1–6. https://doi.org/10.1109/INDICON56171.2022.10040136
Ghosh U, Das D, Chatterjee P, Shetty S (2023) Quantum-Enabled Blockchain for Data Processing and Management in Smart Cities, 2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Boston, MA, USA, pp. 425–430. https://doi.org/10.1109/WoWMoM57956.2023.00075
Chawla D, Mehra PS (2025) Performance analysis of the quantum schemes in the Resource-Constrained IoT network. In: Nanda P, Srivastava S, Verma VK, Vyas P (eds) Intelligent system and data analysis. SSIC 2023. Smart innovation, systems and technologies, vol 398. Springer, Singapore. https://doi.org/10.1007/978-981-97-5200-3_30 Chapter Google Scholar
Bera B, Das AK, Sikdar B (2025) Securing Next-Generation Quantum IoT Applications using Quantum Key Distribution, in IEEE Internet of Things Magazine, vol. 8, no. 1, pp. 50–56, January https://doi.org/10.1109/IOTM.001.2400059
Ahmed A, Abd EL-L, Abd-El-Atty B, Venegas-Andraca SE (2019) Wojciech mazurczyk, efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Generation Comput Syst 100:893–906. https://doi.org/10.1016/j.future.2019.05.053. ISSN 0167-739X Article Google Scholar
Yaqi Gong A, Schroeder (2022) A systematic literature review of data privacy and security research on smart tourism, Tourism Management Perspectives, Volume 44, 101019, ISSN 2211–9736. https://doi.org/10.1016/j.tmp.2022.101019
Tao Lin P, Wu F, Gao (2022) Information security of flowmeter communication network based on multi-sensor data fusion. Energy Rep 8 Pages 12643–12652, ISSN 2352–4847. https://doi.org/10.1016/j.egyr.2022.09.072
Junjun Guo L, Wang (2020) Learning to upgrade internet information security and protection strategy in big data era, Computer Communications, Volume 160, Pages 150–157, ISSN 0140–3664. https://doi.org/10.1016/j.comcom.2020.05.043
Fursan Thabit S, Alhomdy S, Jagtap (2021) A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int J Intell Networks 2 Pages 18–33, ISSN 2666–6030. https://doi.org/10.1016/j.ijin.2021.03.001
Ismagilova E, Hughes L, Rana NP et al (2022) Security, privacy and risks within smart cities: literature review and development of a smart City interaction framework. Inf Syst Front 24:393–414. https://doi.org/10.1007/s10796-020-10044-1 Article Google Scholar
Gesmann-Nuissl D, Tacke I, Olschewski B (2024) ELSA for the smart city: ethical, legal, and social technologization of homes, cities, and societies through standardized ELSA-Assessment—A legal point of view. DISO 3:63. https://doi.org/10.1007/s44206-024-00153-8 Article Google Scholar
Abbas SR, Abbas Z, Zahir A, Lee SW (2024) Federated learning in smart healthcare: A comprehensive review on privacy, security, and predictive analytics with IoT integration. Healthcare 12:2587. https://doi.org/10.3390/healthcare12242587 Article Google Scholar
Dhirani LL, Mukhtiar N, Chowdhry BS, Newe T (2023) Ethical dilemmas and privacy issues in emerging technologies: A review. Sens (Basel) 23(3):1151. https://doi.org/10.3390/s23031151PMID: 36772190; PMCID: PMC9921682 Article Google Scholar
Rawindaran N (2023) Legal considerations and ethical challenges of artificial intelligence on internet of things and smart cities. In: Hewage C, Rahulamathavan Y, Ratnayake D (eds) Data protection in a Post-Pandemic society. Springer, Cham. https://doi.org/10.1007/978-3-031-34006-2_8 Chapter Google Scholar
Zhu H, Chau SC-K, Guarddin G, Liang W (Nov. 2022) Integrating IoT-Sensing and crowdsensing with privacy: Privacy-Preserving hybrid sensing for smart cities. ACM Trans Internet Things 3(4):, article 31, 1–30. https://doi.org/10.48550/arXiv.2206.14466
Padma A, Ramaiah M (2024) Blockchain Based an Efficient and Secure Privacy Preserved Framework for Smart Cities, in IEEE Access, vol. 12, pp. 21985–22002. https://doi.org/10.1109/ACCESS.2024.3364078
Mahin Mohammadi R, Rawassizadeh A, Sheikhtaheri A consumer-centered security framework for sharing health data in social networks. J Inform Secur Appl, 69, 2022, 103303, ISSN 2214 – 2126, https://doi.org/10.1016/j.jisa.2022.103303
Mahin Mohammadi RQ, Li X, Wang P, Wang W, Zhang J, Yin FARDA A fog-based anonymous reward data aggregation security scheme in smart buildings, Building and environment, 225, 2022, 109578, ISSN 0360–1323, https://doi.org/10.1016/j.buildenv.2022.109578
Awassizadeh A, Sheikhtaheri (2022) A consumer-centered security framework for sharing health data in social networks. J Inform Secur Appl 69 103303, ISSN 2214 – 2126. https://doi.org/10.1016/j.jisa.2022.103303
Shabana Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil, Cryptographic Data Security for Reliable Wireless Sensor Network (2023) Alexandria Eng J 72 Pages 37–50, ISSN 1110 – 0168. https://doi.org/10.1016/j.aej.2023.03.061
Basha US, Gupta SK, Alawad W, Kim SK, Bharany S (2024) Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol, Computers, Materials and Continua, Volume 79, Issue 2, Pages 3397–3416, ISSN 1546–2218. https://doi.org/10.32604/cmc.2024.046265
Li D, Gong Y The design of power grid data management system based on blockchain technology and construction of system security evaluation model. Energy Rep, 8, Supplement 7, 2022, Pages 466–479, ISSN 2352–4847, https://doi.org/10.1016/j.egyr.2022.05.277
Wang Y et al (2024) Knowledge and Data Dual-Driven Fault Diagnosis in Industrial Scenarios: A Survey, in IEEE Internet of Things Journal, vol. 11, no. 11, pp. 19256–19277, 1 June1. https://doi.org/10.1109/JIOT.2024.3387538
Heiyanthuduwage SR, Altas I, Bewong M, Islam MZ, Deho OB (2024) Decision Trees in Federated Learning: Current State and Future Opportunities, in IEEE Access, vol. 12, pp. 127943–127965. https://doi.org/10.1109/ACCESS.2024.3440998
Gkontzis AF, Kotsiantis S, Feretzakis G, Verykios VS (2024) Enhancing urban resilience: smart city data analyses, forecasts, and digital twin techniques at the neighborhood level. Future Internet 16(2):47. https://doi.org/10.3390/fi16020047 Article Google Scholar
Premkumar R, Sathya Priya S (2022) Service constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain, measurement, vol 24. Sensors, pp 2665–9174. https://doi.org/10.1016/j.measen.2022.100486
Hui, Gao, Design of Network Data Information Security Monitoring System Based on Big Data Technology (2023) Procedia Comput Sci 228 Pages 348–355, ISSN 1877 – 0509. https://doi.org/10.1016/j.procs.2023.11.040
Sindjoung MLF, Velempini M Clémentin Tayou Djamegni, A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network, Array, Volume 19, 2023, 100304, ISSN 2590-0056. https://doi.org/10.1016/j.array.2023.100304
Olufemi OO (2023) Odeyemi Kehinde Oluwasesan, An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things, Internet of Things, Volume 23, 100862, ISSN 2542–6605. https://doi.org/10.1016/j.iot.2023.100862
Rai HM, Shukla KK, Tightiz L, Padmanaban S Enhancing data security and privacy in energy applications: Integrating IoT and blockchain technologies, Heliyon, Volume 10, Issue 19, 2024, e38917, ISSN 2405–8440. https://doi.org/10.1016/j.heliyon.2024.e38917
Ziwei, Song (2024) Personal data security and stock crash risk: Evidence from China’s Cybersecurity Law, China Journal of Accounting Research, Volume 17, Issue 4, 100393, ISSN 1755–3091. https://doi.org/10.1016/j.cjar.2024.100393
Luo X, He L, Wei X, Zhu M, Li Z Security requirement classification of electricity trading data based on hierarchical fuzzy Petri network, Energy Rep, 9, Supplement 7, 2023, Pages 189–199, ISSN 2352–4847, https://doi.org/10.1016/j.egyr.2023.04.079
Satilmiş H, Akleylek S, Tok ZY (2024) A Systematic Literature Review on Host-Based Intrusion Detection Systems, in IEEE Access, vol. 12, pp. 27237–27266. https://doi.org/10.1109/ACCESS.2024.3367004
Masciari E, Umair A, Ullah MH (2024) A Systematic Literature Review on AI-Based Recommendation Systems and Their Ethical Considerations, in IEEE Access, vol. 12, pp. 121223–121241. https://doi.org/10.1109/ACCESS.2024.3451054
Prasad Vangapandu T, Surendra C, Ramineni M, Radha Madhavi R, Hari, Kishore (2024) Knowl Based Syst 306:0950–7051. https://doi.org/10.1016/j.knosys.2024.112653. Hybridized data encoding based encryption and Diffie Hellman decryption for security enhancement
Tian Z, Han M, Jiang C Research on platform data security governance strategy based on three-party evolutionary game, Heliyon, Volume 10, Issue 17, 2024, e36391, ISSN 2405–8440. https://doi.org/10.1016/j.heliyon.2024.e36391
Zhang, Zheng (2024) Design and application of data security privacy protection technology in dance action sequence arrangement and display system, vol 33. Sensors, Measurement, pp 2665–9174. https://doi.org/10.1016/j.measen.2024.101178 Book Google Scholar
Gang Han L, Li B, Qin D, Zheng (2024) Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT, Journal of King Saud University - Computer and Information Sciences, Volume 36, Issue 6, 102105, ISSN 1319–1578. https://doi.org/10.1016/j.jksuci.2024.102105
Shameer Mohammed S, Nanthini N, Bala Krishna IV, Srinivas M, Rajagopal M, Ashok Kumar (2023) A new lightweight data security system for data security in the cloud computing, Measurement: Sensors, Volume 29, 100856, ISSN 2665–9174, https://doi.org/10.1016/j.measen.2023.100856
Xuejie, Niu Exploration on human resource management and prediction model of data-driven information security in Internet of Things, Heliyon, Volume 10, Issue 9, 2024, e29582, ISSN 2405–8440. https://doi.org/10.1016/j.heliyon.2024.e29582
Abdillah Abdillah I, Widianingsih RA, Buchari H, Nurasa Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia, Array, Volume 21, 2024, 100336, ISSN 2590-0056. https://doi.org/10.1016/j.array.2024.100336
Zhang X, Cui L, Shen W, Wang Y (2024) Design and Implementation of Intelligent Data Security Risk Assessment and Management System, Procedia Computer Science, Volume 243, Pages 148–155, ISSN 1877 – 0509, https://doi.org/10.1016/j.procs.2024.09.020
Bassim M, Salih, Omer K, Jasim Mohammad (2024) Cloud Data Leakage, Security, Privacy Issues and Challenges: Review, Procedia Computer Science, Volume 242, Pages 592–601, ISSN 1877 – 0509. https://doi.org/10.1016/j.procs.2024.08.113