Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …

Revocable attribute-based encryption with data integrity in clouds

C Ge, W Susilo, J Baek, Z Liu, J **a… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cloud computing enables enterprises and individuals to outsource and share their data.
This way, cloud computing eliminates the heavy workload of local information infrastructure …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J **a, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J **a… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

J Ning, Z Cao, X Dong, K Liang, H Ma… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
As a sophisticated mechanism for secure finegrained access control over encrypted data,
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …

Searchable attribute-based mechanism with efficient data sharing for secure cloud storage

K Liang, W Susilo - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
To date, the growth of electronic personal data leads to a trend that data owners prefer to
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

[HTML][HTML] Quantum communication with RLP quantum resistant cryptography in industrial manufacturing

B Senapati, BS Rawal - Cyber Security and Applications, 2023 - Elsevier
This paper presents the best outcome of the Quantum communication use case of industrial
manufacturing, using quantum theory to achieve secure data transfer between industrial …

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

K Liang, MH Au, JK Liu, W Susilo, DS Wong… - Future Generation …, 2015 - Elsevier
Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data
owner to delegate the access rights of the encrypted data stored on a cloud storage system …