Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system

Y Yang, X Zheng, W Guo, X Liu, V Chang - Information Sciences, 2019‏ - Elsevier
In this paper, a privacy-preserving smart IoT-based healthcare big data storage system with
self-adaptive access control is proposed. The aim is to ensure the security of patients' …

A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds

C Ge, W Susilo, J Baek, Z Liu, J **a… - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J **a, L Fang - IEEE transactions on dependable …, 2019‏ - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J **a… - … on Dependable and …, 2020‏ - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

A Review of the State of the Art in Privacy and Security in the eHealth Cloud

A Sahi, D Lai, Y Li - Ieee Access, 2021‏ - ieeexplore.ieee.org
The proliferation and usefulness of cloud computing in eHealth demands high levels of
security and privacy for health records. However, eHealth clouds pose serious security and …

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Y Zhang, X Chen, J Li, DS Wong, H Li, I You - Information Sciences, 2017‏ - Elsevier
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …

Certificateless public key authenticated encryption with keyword search for industrial internet of things

D He, M Ma, S Zeadally, N Kumar… - IEEE Transactions on …, 2017‏ - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile
devices, and communication technologies to enable the upgrade of traditional industries to …

Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

J Ning, Z Cao, X Dong, K Liang, H Ma… - IEEE Transactions on …, 2017‏ - ieeexplore.ieee.org
As a sophisticated mechanism for secure finegrained access control over encrypted data,
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …

An efficient access control scheme with outsourcing capability and attribute update for fog computing

P Zhang, Z Chen, JK Liu, K Liang, H Liu - Future Generation Computer …, 2018‏ - Elsevier
Fog computing as an extension of cloud computing provides computation, storage and
application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a …

FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things

X Zhang, C Xu, H Wang, Y Zhang… - IEEE Transactions on …, 2019‏ - ieeexplore.ieee.org
Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide
massive data storage services. To ensure the confidentiality, sensitive industrial data need …