4.7 Article

A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT

Jiguo Li et al.

Summary: This article proposes a CP-ABE scheme for access control of IoT data on the cloud, providing fine-grained and flexible access control and addressing key abuse issues.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Dual Access Control for Cloud-Based Data Storage and Sharing

Jianting Ning et al.

Summary: Cloud-based data storage service has gained increasing attention due to its efficient and low-cost management. To ensure data confidentiality and user privacy, service providers need to utilize secure data storage and sharing mechanisms. In this article, the authors propose two dual access control systems and analyze their security.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Theory & Methods

Cost-Effective App Data Distribution in Edge Computing

Xiaoyu Xia et al.

Summary: In this article, the Edge Data Distribution (EDD) problem is formulated as a constrained optimization problem from the app vendor's perspective, and two algorithms are proposed to solve the problem efficiently. Experimental results show that these two algorithms significantly outperform three representative approaches on a real-world dataset.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Theory & Methods

A Game-Theoretical Approach for User Allocation in Edge Computing Environment

Qiang He et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2020)

Article Computer Science, Information Systems

Flexible attribute-based proxy re-encryption for efficient data sharing

Hua Deng et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things

Tian Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Theory & Methods

Attribute-based Encryption for Cloud Computing Access Control: A Survey

Yinghui Zhang et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Theory & Methods

An Overview of Service Placement Problem in Fog and Edge Computing

Farah Ait Salaht et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Hardware & Architecture

Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things

Dong Zheng et al.

IEEE WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Edge-Computing-Enabled Smart Cities: A Comprehensive Survey

Latif U. Khan et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation

Shengmin Xu et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Fine-grained information flow control using attributes

Jinguang Han et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

A computation offloading method over big data for IoT-enabled cloud-edge computing

Xiaolong Xu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Jianghong Wei et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Article Computer Science, Theory & Methods

Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage

Kaiping Xue et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud

Shengmin Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics

Quan Zhang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2018)

Article Computer Science, Information Systems

AKSER: Attribute-based keyword search with efficient revocation in cloud computing

Jie Cui et al.

INFORMATION SCIENCES (2018)

Article Engineering, Electrical & Electronic

Bringing Computation Closer toward the User Network: Is Edge Computing the Solution?

Ejaz Ahmed et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Engineering, Electrical & Electronic

A Cloud-Edge Computing Framework for Cyber-Physical-Social Services

Xiaokang Wang et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Proceedings Paper Computer Science, Information Systems

FAME: Fast Attribute-based Message Encryption

Shashank Agrawal et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Wenhai Sun et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Theory & Methods

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

Wei Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Information Systems

Cloud based data sharing with fine-grained proxy re-encryption

Yanjiang Yang et al.

PERVASIVE AND MOBILE COMPUTING (2016)

Review Computer Science, Information Systems

Edge Computing: Vision and Challenges

Weisong Shi et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Proceedings Paper Computer Science, Information Systems

Improved Dual System ABE in Prime-Order Groups via Predicate Encodings

Jie Chen et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II (2015)

Article Computer Science, Theory & Methods

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Ning Cao et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Ming Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)