Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system

Y Yang, X Zheng, W Guo, X Liu, V Chang - Information Sciences, 2019 - Elsevier
In this paper, a privacy-preserving smart IoT-based healthcare big data storage system with
self-adaptive access control is proposed. The aim is to ensure the security of patients' …

A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds

C Ge, W Susilo, J Baek, Z Liu, J **a… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …

Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J **a… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J **a, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

A Review of the State of the Art in Privacy and Security in the eHealth Cloud

A Sahi, D Lai, Y Li - Ieee Access, 2021 - ieeexplore.ieee.org
The proliferation and usefulness of cloud computing in eHealth demands high levels of
security and privacy for health records. However, eHealth clouds pose serious security and …

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Y Zhang, X Chen, J Li, DS Wong, H Li, I You - Information Sciences, 2017 - Elsevier
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …

Certificateless public key authenticated encryption with keyword search for industrial internet of things

D He, M Ma, S Zeadally, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile
devices, and communication technologies to enable the upgrade of traditional industries to …

Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

J Ning, Z Cao, X Dong, K Liang, H Ma… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
As a sophisticated mechanism for secure finegrained access control over encrypted data,
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …

A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Lightweight searchable encryption protocol for industrial internet of things

K Zhang, J Long, X Wang, HN Dai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …