Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
In this paper, we propose an accountable privacy preserving attribute-based framework,
called Ins-PAbAC, that combines attribute based encryption and attribute based signature …
called Ins-PAbAC, that combines attribute based encryption and attribute based signature …
Analysis of attribute‐based cryptographic techniques and their application to protect cloud services
Recent technological advances such as the internet of things, fog computing, and cloud
applications lead to exponential growth in the amount of generated data. Indeed, cloud …
applications lead to exponential growth in the amount of generated data. Indeed, cloud …
Secure fog-assisted crowdsensing with collusion resistance: From data reporting to data requesting
The development and ubiquity of smart mobile devices have produced the idea of
crowdsensing, where people report and request data in a community via a cloud server …
crowdsensing, where people report and request data in a community via a cloud server …
Collusion defender: Preserving subscribers' privacy in publish and subscribe systems
The Publish and Subscribe (pub/sub) system is an established paradigm to disseminate the
data from publishers to subscribers in a loosely coupled manner using a network of …
data from publishers to subscribers in a loosely coupled manner using a network of …
CUPS: secure opportunistic cloud of things framework based on attribute‐based encryption scheme supporting access policy update
The ever‐growing number of internet connected devices, coupled with the new computing
trends, namely within emerging opportunistic networks, engenders several security …
trends, namely within emerging opportunistic networks, engenders several security …
Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud
Advanced technology is the cloud computing that has the ability to preserve massive amount
of data and shares the data resources over the internet. Cloud computing has a wide range …
of data and shares the data resources over the internet. Cloud computing has a wide range …
A secure privacy-preserving mutual authentication scheme for publish-subscribe fog computing
FM Salem - 2018 14th International Computer Engineering …, 2018 - ieeexplore.ieee.org
The exponential grow of internet of things applications leads to proposing fog computing
structure that is geospatially distributed and latency sensitive. Since asynchronous …
structure that is geospatially distributed and latency sensitive. Since asynchronous …
Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols
This paper proposes a privacy preservation-based data security and secure data protocol for
distributed Data Storage and Communication (DSaC). An effective performance analysis is …
distributed Data Storage and Communication (DSaC). An effective performance analysis is …