Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

TRAC: Traceable and revocable access control scheme for mHealth in 5G-enabled IIoT

Q Li, B **a, H Huang, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile healthcare (mHealth) enables people to collect and share their personal health
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …

A secure cloud framework to share EHRs using modified CP-ABE and the attribute bloom filter

G Ramu - Education and Information Technologies, 2018 - Springer
In recent years, the Internet of Things (IoT), cloud computing, and wireless body area
networks (WBANs) have converged and become popular due to their potential to improve …

Sensitive and energetic IoT access control for managing cloud electronic health records

K Riad, R Hamza, H Yan - IEEE Access, 2019 - ieeexplore.ieee.org
Electronic health records (EHRs) replaced the old paper-based systems to make patient
data more accurate, reliable, and more accessible. Yet, the EHRs system requires high …

Flexible attribute-based proxy re-encryption for efficient data sharing

H Deng, Z Qin, Q Wu, Z Guan, Y Zhou - Information Sciences, 2020 - Elsevier
An increasing number of people are sharing their data through third-party platforms. Attribute-
based encryption (ABE) is a promising primitive that allows enforcing fine-grained access …

A dynamic and hierarchical access control for IoT in multi-authority cloud storage

K Riad, T Huang, L Ke - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Internet-of-Things (IoT) is massively growing and introducing several benefits that
are able to transform the world. Also, cloud computing has become significantly important …

A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing

J **ong, X Chen, Q Yang, L Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The designs of existing incentive mechanisms in mobile crowdsensing (MCS) are primarily
platform-centered or user-centered, while overlooking the multidimensional consideration of …

Blockchain-based digital rights management scheme via multiauthority ciphertext-policy attribute-based encryption and proxy re-encryption

J Gao, H Yu, X Zhu, X Li - IEEE systems journal, 2021 - ieeexplore.ieee.org
In order to ensure the confidentiality of digital contents, improve the fairness of digital
copyright transactions, and reduce the time and management overhead of digital copyright …