Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system
In this paper, a privacy-preserving smart IoT-based healthcare big data storage system with
self-adaptive access control is proposed. The aim is to ensure the security of patients' …
self-adaptive access control is proposed. The aim is to ensure the security of patients' …
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
Secure keyword search and data sharing mechanism for cloud computing
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …
software resources in computing infrastructure. To ensure security, the data is usually …
A Review of the State of the Art in Privacy and Security in the eHealth Cloud
The proliferation and usefulness of cloud computing in eHealth demands high levels of
security and privacy for health records. However, eHealth clouds pose serious security and …
security and privacy for health records. However, eHealth clouds pose serious security and …
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …
Certificateless public key authenticated encryption with keyword search for industrial internet of things
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile
devices, and communication technologies to enable the upgrade of traditional industries to …
devices, and communication technologies to enable the upgrade of traditional industries to …
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
As a sophisticated mechanism for secure finegrained access control over encrypted data,
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
An efficient access control scheme with outsourcing capability and attribute update for fog computing
Fog computing as an extension of cloud computing provides computation, storage and
application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a …
application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a …
FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things
Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide
massive data storage services. To ensure the confidentiality, sensitive industrial data need …
massive data storage services. To ensure the confidentiality, sensitive industrial data need …