4.4 Article

New attribute-based encryption schemes with anonymous authentication and time limitation in fog computing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies

Hamed Arshad et al.

Summary: Attribute-Based Encryption (ABE) is a cryptographic solution that protects resources in a fine-grained manner based on a set of public attributes. This paper proposes a Semantic ABE (SABE) framework by extending a classical Ciphertext-Policy ABE (CP-ABE) scheme with semantic technologies, improving functionality and cross-domain interoperability.

INFORMATION SCIENCES (2022)

Review Mathematics, Applied

A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods

M. H. Noorallahzade et al.

Summary: This article emphasizes the importance and necessity of public key searchable encryption in cloud computing, as well as the review and categorization of these designs.

INTERNATIONAL JOURNAL OF MATHEMATICS AND MATHEMATICAL SCIENCES (2022)

Article Engineering, Multidisciplinary

A novel traceability approach in IoT paradigm for CP-ABE proxy re-encryption

Nishant Doshi

Summary: Internet of Things (IoT) is a technology aimed at providing cost-effective infrastructure for various issues, with data security being crucial. CP-ABE is identified as a promising technique, but improvements are needed to address existing issues.

SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES (2022)

Article Computer Science, Information Systems

Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT

Soumya Banerjee et al.

Summary: Recent advances in LPWAN are expected to enhance the proliferation of IIoT, but concerns about security and privacy challenges remain. This work proposes a novel blockchain-based user access control scheme for data security and scalability in IIoT. The scheme encrypts data using CP-ABE, supports multiple attribute authorities, and provides secure data access through blockchain implementation. Security analysis shows the scheme's robustness against attacks, and comparison with existing schemes highlights its advantages.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Information Systems

An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks

Maria Azees et al.

Summary: WBAN is utilized for exchanging biological data between patients and doctors through a network of implantable or wearable medical sensors, providing suitable medical services. Secure anonymous authentication and confidentiality preservation schemes are essential for ensuring safe data transmission and play a significant role in maintaining security levels.

WIRELESS NETWORKS (2021)

Article Computer Science, Theory & Methods

A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices

Mande Xie et al.

Summary: With the rapid development of cloud computing, attribute-based encryption (ABE) has attracted widespread attentions due to its unique attribute matching mechanism, while mobile devices have put forward higher requirements for ABE schemes. In this paper, an original hybrid cloud multi-authority ciphertext-policy attribute-based encryption (HCMACP-ABE) scheme is proposed, utilizing the LSSS access structure for secure access control and the private cloud for maintaining user authorization lists and verifying users. The proposal achieves IND-CCA secure and is efficient in a mobile hybrid cloud environment.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Theory & Methods

CCA-secure ABE with outsourced decryption for fog computing

Cong Zuo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Peng Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

Yinhao Jiang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Cloud-Based Fine-Grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation

Lo-Yao Yeh et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Article Computer Science, Information Systems

New directly revocable attribute-based encryption scheme and its application in cloud storage environment

Hao Wang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

Lightweight distributed secure data management system for health internet of things

Yang Yang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT

Rongxing Lu et al.

IEEE ACCESS (2017)

Proceedings Paper Computer Science, Information Systems

FAME: Fast Attribute-based Message Encryption

Shashank Agrawal et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

Healing on the cloud: Secure cloud architecture for medical wireless sensor networks

Ahmed Lounis et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Theory & Methods

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Shulan Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Secure and Efficient Data Communication Protocol for Wireless Body Area Networks

Chunqiang Hu et al.

IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

New Publicly Verifiable Databases with Efficient Updates

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Proceedings Paper Computer Science, Hardware & Architecture

A Work in Progress: Context based encryption scheme for Internet of Things

Jungyub Lee et al.

10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS (2015)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks

Shucheng Yu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)