Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Y Zhang, X Chen, J Li, DS Wong, H Li, I You - Information Sciences, 2017 - Elsevier
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …

Improving privacy and security in decentralized ciphertext-policy attribute-based encryption

J Han, W Susilo, Y Mu, J Zhou… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
In previous privacy-preserving multiauthority attribute-based encryption (PPMA-ABE)
schemes, a user can acquire secret keys from multiple authorities with them knowing his/her …

Attribute-based data access control in mobile cloud computing: Taxonomy and open issues

M Sookhak, FR Yu, MK Khan, Y **ang… - Future Generation …, 2017 - Elsevier
With the thriving growth of the cloud computing, the security and privacy concerns of
outsourcing data have been increasing dramatically. However, because of delegating the …

Efficient decentralized attribute based access control for mobile clouds

SJ De, S Ruj - IEEE transactions on cloud computing, 2017 - ieeexplore.ieee.org
Fine grained access control is a requirement for data stored in untrusted servers like clouds.
Owing to the large volume of data, decentralized key management schemes are preferred …

A survey on multi-authority and decentralized attribute-based encryption

PSK Oberko, VHKS Obeng, H **ong - Journal of Ambient Intelligence and …, 2022 - Springer
The introduction of attribute-based encryption (ABE) targets to achieve the implementation of
single-to-numerous encryption; however, the sole authority challenge and the issue of …

Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption

Q Xu, C Tan, Z Fan, W Zhu, Y **ao, F Cheng - IEEE Access, 2018 - ieeexplore.ieee.org
Nowadays, secure data access control has become one of the major concerns in a cloud
storage system. As a logical combination of attribute-based encryption and attribute-based …

VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud

H Wang, D He, J Han - IEEE transactions on services …, 2017 - ieeexplore.ieee.org
Remote data access control is of crucial importance in public cloud. Based on its own
inclinations, the data owner predefines the access policy. When the user satisfies the data …

Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage

P Liang, L Zhang, L Kang, J Ren - Journal of Information Security and …, 2019 - Elsevier
Personal health record (PHR) system has become an important platform for health
information exchange, in which patients can effectively manage and share personal health …