Survey on revocation in ciphertext-policy attribute-based encryption

RR Al-Dahhan, Q Shi, GM Lee, K Kifayat - Sensors, 2019 - mdpi.com
Recently, using advanced cryptographic techniques to process, store, and share data
securely in an untrusted cloud environment has drawn widespread attention from academic …

A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control

J Li, D Han, Z Wu, J Wang, KC Li… - Future generation …, 2023 - Elsevier
With the increasing sales of the medical device market, the medical incidents caused by
passive medical devices are increasing, which needs to be solved from the medical device …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications

S Ganapathy - Computer Networks, 2019 - Elsevier
Cloud computing and Internet of Things (IoT) are emerging technologies which have the
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …

Privacy-preserving authentication and key agreement protocols for D2D group communications

M Wang, Z Yan - IEEE Transactions on Industrial Informatics, 2017 - ieeexplore.ieee.org
Device-to-Device (D2D) communications play a key role in the next generation mobile
communication networks and wireless systems (5G) and the Internet of Things ecosystem …

Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption

C Guo, X Chen, Y Jie, Z Fu, M Li… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
As cloud computing becomes prevalent, more and more data owners are likely to outsource
their data to a cloud server. However, to ensure privacy, the data should be encrypted before …

Decision tree based user-centric security solution for critical IoT infrastructure

D Puthal, S Wilson, A Nanda, M Liu, S Swain… - Computers and …, 2022 - Elsevier
Data processing in real-time brings better business modeling and an intuitive plan of action.
Internet of things (IoT), being a source of sensitive data collected and communicated through …

Towards differential access control and privacy-preserving for secure media data sharing in the cloud

T Zheng, Y Luo, T Zhou, Z Cai - Computers & Security, 2022 - Elsevier
The development of cloud computing techniques has promoted the continuous sharing of a
tremendous amount of media data. However, the involved parties in such processes usually …

Efficient privacy-preserving access control scheme in electronic health records system

Y Ming, T Zhang - Sensors, 2018 - mdpi.com
The sharing of electronic health records (EHR) in cloud servers is an increasingly important
development that can improve the efficiency of medical systems. However, there are several …

Securing the internet of vehicles through lightweight block ciphers

A Castiglione, F Palmieri, F Colace, M Lombardi… - Pattern Recognition …, 2020 - Elsevier
In recent years, the automotive industry has made significant investments in the Internet of
Things (IoT) paradigm, aiming to develop technologies and services for connected vehicles …