Related references
Note: Only part of the references are listed.CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage
Jianting Ning et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
The Revolution of Blockchain: State-of-the-Art and Research Challenges
Suyel Namasudra et al.
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2021)
A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System
Akanksha Saini et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications
Yong Yu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Blockchain Technology for Cloud Storage: A Systematic Literature Review
Pratima Sharma et al.
ACM COMPUTING SURVEYS (2020)
Attribute-based encryption with outsourced decryption in blockchain
Hui Zheng et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2020)
Mobility-aware load Balancing for Reliable Self-Organization Networks: Multi-agent Deep Reinforcement Learning
Amin Mohajer et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2020)
Blockchain Meets Cloud Computing: A Survey
Keke Gai et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Revocable Attribute-Based Signature for Blockchain-Based Healthcare System
Qianqian Su et al.
IEEE ACCESS (2020)
Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
Zhijun Wu et al.
FUTURE INTERNET (2020)
Query optimization mechanisms in the cloud environments: A systematic study
Elham Azhir et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)
An improved attribute-based encryption technique towards the data security in cloud computing
Suyel Namasudra
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)
A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures
Ling Xiong et al.
IEEE ACCESS (2019)
A Secure Cloud Storage Framework With Access Control Based on Blockchain
Shangping Wang et al.
IEEE ACCESS (2019)
Big Data based Self-Optimization Networking: A Novel Approach Beyond Cognition
Amin Mohajer et al.
INTELLIGENT AUTOMATION AND SOFT COMPUTING (2018)
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
Minxin Du et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Secure data uploading scheme for a smart home system
Jian Shen et al.
INFORMATION SCIENCES (2018)
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
Jian Shen et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
Qun Lin et al.
IEEE ACCESS (2018)
When Intrusion Detection Meets Blockchain Technology: A Review
Weizhi Meng et al.
IEEE ACCESS (2018)
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
Yinghui Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Towards Secure Localized Certificate Revocation in Mobile Ad-Hoc Networks
Mohammad Masdari
IETE TECHNICAL REVIEW (2017)
Comprehensive Evaluation of the Localized Certificate Revocation in Mobile Ad Hoc Network
Mohammad Masdari et al.
WIRELESS PERSONAL COMMUNICATIONS (2017)
Intelligent cryptography approach for secure distributed big data storage in cloud computing
Yibin Li et al.
INFORMATION SCIENCES (2017)
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Yinghui Zhang et al.
INFORMATION SCIENCES (2017)
Key management in wireless Body Area Network: Challenges and issues
Mohammad Masdari et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Cloud security issues and challenges: A survey
Ashish Singh et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Proxy-assisted access control scheme of cloud data for smart cities
Kai Fan et al.
PERSONAL AND UBIQUITOUS COMPUTING (2017)
Data Backlog Analysis in Energy Harvesting Communication Systems
Riheng Jia et al.
IEEE ACCESS (2017)
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Nesrine Kaaniche et al.
COMPUTER COMMUNICATIONS (2017)
A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
Youngjoo Shin et al.
ACM COMPUTING SURVEYS (2017)
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseaEuro
Zhen Liu et al.
COMPUTER JOURNAL (2016)
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
Pratish Datta et al.
INFORMATION SECURITY, ISC 2015 (2015)
Ciphertext-policy attribute-based encryption
John Bethencourt et al.
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)