Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system
In this paper, a privacy-preserving smart IoT-based healthcare big data storage system with
self-adaptive access control is proposed. The aim is to ensure the security of patients' …
self-adaptive access control is proposed. The aim is to ensure the security of patients' …
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
Secure keyword search and data sharing mechanism for cloud computing
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …
software resources in computing infrastructure. To ensure security, the data is usually …
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
A Review of the State of the Art in Privacy and Security in the eHealth Cloud
A Sahi, D Lai, Y Li - Ieee Access, 2021 - ieeexplore.ieee.org
The proliferation and usefulness of cloud computing in eHealth demands high levels of
security and privacy for health records. However, eHealth clouds pose serious security and …
security and privacy for health records. However, eHealth clouds pose serious security and …
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …
Certificateless public key authenticated encryption with keyword search for industrial internet of things
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile
devices, and communication technologies to enable the upgrade of traditional industries to …
devices, and communication technologies to enable the upgrade of traditional industries to …
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
As a sophisticated mechanism for secure finegrained access control over encrypted data,
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
A survey on cryptographic techniques for protecting big data security: present and forthcoming
S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …
and provide novel ways of exploring the world. As they significantly create economic and …
Lightweight searchable encryption protocol for industrial internet of things
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …