Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
Abstract The Internet of Things (IoT) is increasingly becoming widespread in different areas
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …
Towards differential access control and privacy-preserving for secure media data sharing in the cloud
The development of cloud computing techniques has promoted the continuous sharing of a
tremendous amount of media data. However, the involved parties in such processes usually …
tremendous amount of media data. However, the involved parties in such processes usually …
Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage
L Jiang, D Guo - IEEE Access, 2017 - ieeexplore.ieee.org
Since Cloud Service Provider is a semi-trusted party in cloud storage, to protect data from
being disclosed, users' data are encrypted before being uploaded to a cloud server …
being disclosed, users' data are encrypted before being uploaded to a cloud server …
An improved proxy Re-encryption scheme for IoT-based data outsourcing services in clouds
HY Lin, YM Hung - Sensors, 2020 - mdpi.com
IoT-based data outsourcing services in clouds could be regarded as a new trend in recent
years, as they could reduce the hardware and software cost for enterprises and obtain …
years, as they could reduce the hardware and software cost for enterprises and obtain …
DSAS: a secure data sharing and authorized searchable framework for e-healthcare system
L Xue - IEEE Access, 2022 - ieeexplore.ieee.org
In e-healthcare system, an increasing number of patients enjoy high-quality medical
services by sharing encrypted personal healthcare records (PHRs) with doctors or medical …
services by sharing encrypted personal healthcare records (PHRs) with doctors or medical …
End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption
S Lin, L Cui, N Ke - Sensors, 2024 - mdpi.com
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study
introduces an improved end-to-end encryption approach using conditional proxy re …
introduces an improved end-to-end encryption approach using conditional proxy re …
Towards secure data distribution systems in mobile cloud computing
J Zhang, Z Zhang, H Guo - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
Though the electronic technologies have undergone fast developments in recent years,
mobile devices such as smartphones are still comparatively weak in contrast to desktops in …
mobile devices such as smartphones are still comparatively weak in contrast to desktops in …
Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some
encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud …
encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud …
Offline privacy preserving proxy re-encryption in mobile cloud computing
ASV Koe, Y Lin - Pervasive and Mobile Computing, 2019 - Elsevier
This paper addresses the always online behavior of the data owner in proxy re-encryption
schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext …
schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext …
Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing
H Hu, Y Zhou, Z Cao, X Dong - Applied Sciences, 2022 - mdpi.com
Cloud computing has become popular in data sharing mainly because it has huge storage
capacity and computing power. Securing the privacy of sensitive data for cloud-based data …
capacity and computing power. Securing the privacy of sensitive data for cloud-based data …