Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

Full verifiability for outsourced decryption in attribute based encryption

J Li, Y Wang, Y Zhang, J Han - IEEE transactions on services …, 2017 - ieeexplore.ieee.org
Attribute based encryption (ABE) is a popular cryptographic technology to protect the
security of users' data. However, the decryption cost and ciphertext size restrict the …

Mediated ciphertext-policy attribute-based encryption and its application

L Ibraimi, M Petkovic, S Nikova, P Hartel… - … Workshop, WISA 2009 …, 2009 - Springer
Abstract In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is
associated with a set of attributes, and the ciphertext is associated with an access policy …

[PDF][PDF] A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.

CC Lee, PS Chung, MS Hwang - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
Abstract In Attribute-based Encryption (ABE) scheme, attributes play a very important role.
Attributes have been exploited to generate a public key for encrypting data and have been …

SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs

L Cheng, J Liu, G Xu, Z Zhang, H Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Assisting traffic control is one of the most important applications on the Internet of Vehicles
(IoVs). Traffic information provided by vehicles is desired since drivers or vehicle sensors …

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

HSG Pussewalage, VA Oleshchuk - International Journal of Information …, 2016 - Elsevier
In the last few decades, there have been significant efforts in integrating information and
communication technologies (ICT) into healthcare practices. This new paradigm commonly …

Secure management of personal health records by applying attribute-based encryption

L Ibraimi, M Asim, M Petković - Proceedings of the 6th …, 2009 - ieeexplore.ieee.org
The confidentiality of personal health records is a major problem when patients use
commercial Web-based systems to store their health data. Traditional access control …