Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) is increasingly becoming widespread in different areas
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …

Towards differential access control and privacy-preserving for secure media data sharing in the cloud

T Zheng, Y Luo, T Zhou, Z Cai - Computers & Security, 2022 - Elsevier
The development of cloud computing techniques has promoted the continuous sharing of a
tremendous amount of media data. However, the involved parties in such processes usually …

Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage

L Jiang, D Guo - IEEE Access, 2017 - ieeexplore.ieee.org
Since Cloud Service Provider is a semi-trusted party in cloud storage, to protect data from
being disclosed, users' data are encrypted before being uploaded to a cloud server …

An improved proxy Re-encryption scheme for IoT-based data outsourcing services in clouds

HY Lin, YM Hung - Sensors, 2020 - mdpi.com
IoT-based data outsourcing services in clouds could be regarded as a new trend in recent
years, as they could reduce the hardware and software cost for enterprises and obtain …

DSAS: a secure data sharing and authorized searchable framework for e-healthcare system

L Xue - IEEE Access, 2022 - ieeexplore.ieee.org
In e-healthcare system, an increasing number of patients enjoy high-quality medical
services by sharing encrypted personal healthcare records (PHRs) with doctors or medical …

End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption

S Lin, L Cui, N Ke - Sensors, 2024 - mdpi.com
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study
introduces an improved end-to-end encryption approach using conditional proxy re …

Towards secure data distribution systems in mobile cloud computing

J Zhang, Z Zhang, H Guo - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
Though the electronic technologies have undergone fast developments in recent years,
mobile devices such as smartphones are still comparatively weak in contrast to desktops in …

Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption

K Liang, W Susilo, JK Liu, DS Wong - The Computer Journal, 2015 - academic.oup.com
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some
encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud …

Offline privacy preserving proxy re-encryption in mobile cloud computing

ASV Koe, Y Lin - Pervasive and Mobile Computing, 2019 - Elsevier
This paper addresses the always online behavior of the data owner in proxy re-encryption
schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext …

Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing

H Hu, Y Zhou, Z Cao, X Dong - Applied Sciences, 2022 - mdpi.com
Cloud computing has become popular in data sharing mainly because it has huge storage
capacity and computing power. Securing the privacy of sensitive data for cloud-based data …