Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
Attribute based encryption in cloud computing: A survey, gap analysis, and future directions
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …
However, storing the data in the untrusted cloud server leads the privacy and access control …
Revocable attribute-based encryption with data integrity in clouds
Cloud computing enables enterprises and individuals to outsource and share their data.
This way, cloud computing eliminates the heavy workload of local information infrastructure …
This way, cloud computing eliminates the heavy workload of local information infrastructure …
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
Secure keyword search and data sharing mechanism for cloud computing
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …
software resources in computing infrastructure. To ensure security, the data is usually …
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
As a sophisticated mechanism for secure finegrained access control over encrypted data,
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
To date, the growth of electronic personal data leads to a trend that data owners prefer to
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …
Privacy protection and data security in cloud computing: a survey, challenges, and solutions
PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …
service. In recent years, there are many research schemes of cloud computing privacy …
[HTML][HTML] Quantum communication with RLP quantum resistant cryptography in industrial manufacturing
This paper presents the best outcome of the Quantum communication use case of industrial
manufacturing, using quantum theory to achieve secure data transfer between industrial …
manufacturing, using quantum theory to achieve secure data transfer between industrial …
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data
owner to delegate the access rights of the encrypted data stored on a cloud storage system …
owner to delegate the access rights of the encrypted data stored on a cloud storage system …