ReLAC: Revocable and lightweight access control with blockchain for smart consumer electronics

J Zong, C Wang, J Shen, C Su… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
The increasing popularity of consumer smart devices has led to concerns about the security
of electronic data. Blockchains, which are tamper-proof, can be used to store electronic data …

Secure, efficient, and weighted access control for cloud-assisted industrial IoT

Q Li, Q Zhang, H Huang, W Zhang… - IEEE Internet of …, 2022‏ - ieeexplore.ieee.org
In the cloud-assisted Industrial Internet of Things (IIoT), ciphertext-policy attribute-based
encryption (CP-ABE) could help the data owner (DO) share his sensitive data via the cloud …

Attribute-based encryption with reliable outsourced decryption in cloud computing using smart contract

C Ge, Z Liu, W Susilo, L Fang… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
Outsourcing the heavy decryption computation to a cloud service provider has been a
promising solution for a resource-constrained mobile device to deploy an attribute-based …

[HTML][HTML] Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain

X Hou, L Zhang, Q Wu, F Rezaeibagha - Journal of King Saud University …, 2023‏ - Elsevier
Ciphertext-policy attribute based encryption (CP-ABE) is widely used to protect data and
privacy security in data sharing because of its fine-grained access control. However, due to …

Ensuring privacy and confidentiality of data on the cloud using an enhanced homomorphism scheme

JK Dawson, F Twum, JH Acquah, YM Missah - Informatica, 2022‏ - informatica.si
Cloud computing is one of the widest phenomena embraced in information technology. This
result from numerous advantages associated with it making many organizations and …

An efficient and decentralized fuzzy reinforcement learning bandwidth controller for multitenant data centers

RH Santos Filho, TN Ferreira, DMF Mattos… - Journal of Network and …, 2022‏ - Springer
Cloud service providers rely on bandwidth overprovisioning to avoid Service Level
Agreements' violation (SLAs) when allocating tenants' resources in multitenant cloud …

Building PUF as a Service: Distributed Authentication and Recoverable Data Sharing With Multidimensional CRPs Security Protection

Y Zhang, B Li, B Liu, J Chang - IEEE Internet of Things Journal, 2024‏ - ieeexplore.ieee.org
Physically unclonable functions (PUFs) have emerged as hardware fingerprints for Internet
of Things (IoT) devices in the form of challenge-response pairs (CRPs). This map** …

[HTML][HTML] Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT

Q Li, G Liu, Q Zhang, L Han, W Chen, R Li… - Digital Communications …, 2024‏ - Elsevier
Abstract Ciphertext-Policy Attribute-Based Encryption (CP-ABE) enables fine-grained
access control on ciphertexts, making it a promising approach for managing data stored in …

Secure access control for eHealth data in emergency rescue case based on traceable attribute-based encryption

Y Shen, W Song, C Zhao, Z Peng - 2022 IEEE international …, 2022‏ - ieeexplore.ieee.org
With the development of cloud computing, patients can obtain efficient and high-quality
medical services by uploading their eHealth data to the cloud for sharing among medical …

SFC‐Based IoT Provisioning on a Hybrid Cloud‐Fog Computing with a Minimized Latency

DA Atinafu, MM Tulu - Journal of Computer Networks and …, 2024‏ - Wiley Online Library
The increasing heterogeneity of traffic in the Internet of Things (IoT) service demands
presents a challenge for computing nodes to meet the computing resources and link …