4.7 Article

Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

Jiguo Li et al.

Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Information Systems

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

Yinbin Miao et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Information Systems

Full Verifiability for Outsourced Decryption in Attribute Based Encryption

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Automation & Control Systems

A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid

Yining Liu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Information Systems

Hierarchical attribute based encryption with continuous leakage-resilience

Jiguo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Key-policy attribute-based encryption against continual auxiliary input leakage

Jiguo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

CCA-secure ABE with outsourced decryption for fog computing

Cong Zuo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage

Jiguo Li et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Information Systems

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

Qi Jiang et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Theory & Methods

Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

Jianting Ning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Cong Zuo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key

Jiguo Li et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

K-SVD WITH A REAL l0 OPTIMIZATION: APPLICATION TO IMAGE DENOISING

Yuan Liu et al.

2018 IEEE 28TH INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP) (2018)

Article Engineering, Electrical & Electronic

Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage

Jiguo Li et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Computer Science, Theory & Methods

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

Hao Yan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Information Systems

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Theory & Methods

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Shulan Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage

Yuyan Guo et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Theory & Methods

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes

Jianting Ning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

Taeho Jung et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption

Jinguang Han et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)

Article Computer Science, Information Systems

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation

Huiling Qian et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Article Computer Science, Information Systems

Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges

Saeid Abolfazli et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts

Hua Deng et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Theory & Methods

Mobile cloud computing: A survey

Niroshinie Fernando et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Theory & Methods

Attribute-Based Encryption With Verifiable Outsourced Decryption

Junzuo Lai et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Theory & Methods

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

Zhiguo Wan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Jinguang Han et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)