ReLAC: Revocable and lightweight access control with blockchain for smart consumer electronics
The increasing popularity of consumer smart devices has led to concerns about the security
of electronic data. Blockchains, which are tamper-proof, can be used to store electronic data …
of electronic data. Blockchains, which are tamper-proof, can be used to store electronic data …
Secure, efficient, and weighted access control for cloud-assisted industrial IoT
In the cloud-assisted Industrial Internet of Things (IIoT), ciphertext-policy attribute-based
encryption (CP-ABE) could help the data owner (DO) share his sensitive data via the cloud …
encryption (CP-ABE) could help the data owner (DO) share his sensitive data via the cloud …
Attribute-based encryption with reliable outsourced decryption in cloud computing using smart contract
Outsourcing the heavy decryption computation to a cloud service provider has been a
promising solution for a resource-constrained mobile device to deploy an attribute-based …
promising solution for a resource-constrained mobile device to deploy an attribute-based …
[HTML][HTML] Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain
Ciphertext-policy attribute based encryption (CP-ABE) is widely used to protect data and
privacy security in data sharing because of its fine-grained access control. However, due to …
privacy security in data sharing because of its fine-grained access control. However, due to …
Ensuring privacy and confidentiality of data on the cloud using an enhanced homomorphism scheme
Cloud computing is one of the widest phenomena embraced in information technology. This
result from numerous advantages associated with it making many organizations and …
result from numerous advantages associated with it making many organizations and …
An efficient and decentralized fuzzy reinforcement learning bandwidth controller for multitenant data centers
Cloud service providers rely on bandwidth overprovisioning to avoid Service Level
Agreements' violation (SLAs) when allocating tenants' resources in multitenant cloud …
Agreements' violation (SLAs) when allocating tenants' resources in multitenant cloud …
Building PUF as a Service: Distributed Authentication and Recoverable Data Sharing With Multidimensional CRPs Security Protection
Physically unclonable functions (PUFs) have emerged as hardware fingerprints for Internet
of Things (IoT) devices in the form of challenge-response pairs (CRPs). This map** …
of Things (IoT) devices in the form of challenge-response pairs (CRPs). This map** …
[HTML][HTML] Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
Abstract Ciphertext-Policy Attribute-Based Encryption (CP-ABE) enables fine-grained
access control on ciphertexts, making it a promising approach for managing data stored in …
access control on ciphertexts, making it a promising approach for managing data stored in …
Secure access control for eHealth data in emergency rescue case based on traceable attribute-based encryption
Y Shen, W Song, C Zhao, Z Peng - 2022 IEEE international …, 2022 - ieeexplore.ieee.org
With the development of cloud computing, patients can obtain efficient and high-quality
medical services by uploading their eHealth data to the cloud for sharing among medical …
medical services by uploading their eHealth data to the cloud for sharing among medical …
SFC‐Based IoT Provisioning on a Hybrid Cloud‐Fog Computing with a Minimized Latency
The increasing heterogeneity of traffic in the Internet of Things (IoT) service demands
presents a challenge for computing nodes to meet the computing resources and link …
presents a challenge for computing nodes to meet the computing resources and link …