Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

An efficient blockchain-based hierarchical data sharing for healthcare internet of things

J Zhang, Y Yang, X Liu, J Ma - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
With the assistance of the Internet of Things, the fast develo** Healthcare Internet of
Things (H-IoT) has promoted the healthcare ecosystem into the era of Health 5.0 and …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system

J Liu, Y Fan, R Sun, L Liu, C Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Due to the massive applications of Internet of Things (IoT) and the prevalence of wearable
devices, e-healthcare systems are widely deployed in medical institutions. As a significant …

Efficient CP-ABE scheme with shared decryption in cloud storage

N Chen, J Li, Y Zhang, Y Guo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a preferred technology used to access control the data
stored in the cloud servers. However, in many cases, the authorized decryption user may be …

Privacy-preserving attribute-based keyword search in shared multi-owner setting

Y Miao, X Liu, KKR Choo, RH Deng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …

TRAC: Traceable and revocable access control scheme for mHealth in 5G-enabled IIoT

Q Li, B **a, H Huang, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile healthcare (mHealth) enables people to collect and share their personal health
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …

Match in my way: Fine-grained bilateral access control for secure cloud-fog computing

S Xu, J Ning, Y Li, Y Zhang, G Xu… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to
provide a variety of on-demand data services via the edge network. Many cryptographic …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …