A secure fog-based architecture for industrial Internet of Things and industry 4.0
The advent of Industrial Internet of Things (IIoT) along with cloud computing has brought a
huge paradigm shift in manufacturing industries resulting in yet another industrial revolution …
huge paradigm shift in manufacturing industries resulting in yet another industrial revolution …
Efficient decentralized attribute based access control for mobile clouds
SJ De, S Ruj - IEEE transactions on cloud computing, 2017 - ieeexplore.ieee.org
Fine grained access control is a requirement for data stored in untrusted servers like clouds.
Owing to the large volume of data, decentralized key management schemes are preferred …
Owing to the large volume of data, decentralized key management schemes are preferred …
Neuralyzer: Flexible expiration times for the revocation of online data
Once data is released to the Internet, there is little hope to successfully delete it, as it may
have been duplicated, reposted, and archived in multiple places. This poses a significant …
have been duplicated, reposted, and archived in multiple places. This poses a significant …
Attribute based access control in clouds: A survey
S Ruj - 2014 International Conference on Signal Processing …, 2014 - ieeexplore.ieee.org
Access control ensures that authorized users are able to access data and unauthorized
users are unable to access data. Most of the data stored in clouds is highly sensitive. So, it is …
users are unable to access data. Most of the data stored in clouds is highly sensitive. So, it is …
Decentralized access control on data in the cloud with fast encryption and outsourced decryption
SJ De, S Ruj - 2015 IEEE global communications conference …, 2015 - ieeexplore.ieee.org
Fine grained access control is a requirement for data stored in untrusted servers like clouds.
Owing to the large volume of data, decentralized key management schemes are preferred …
Owing to the large volume of data, decentralized key management schemes are preferred …
Privacy preserving spatio-temporal attribute-based encryption for cloud applications
Cloud computing offers scalable implementation of applications by sharing internet-based
storage and computing resources. However, its ubiquitous nature introduces the security …
storage and computing resources. However, its ubiquitous nature introduces the security …
[HTML][HTML] Cloud-Based Access Control Including Time and Location
Location-based services (LBS) offer various functionalities, but ensuring secure access to
sensitive user data remains a challenge. Traditional access control methods often need …
sensitive user data remains a challenge. Traditional access control methods often need …
Provisioning Time-Based Subscription in NDN: A Secure and Efficient Access Control Scheme
This paper proposes a novel encryption-based access control mechanism for Named Data
Networking (NDN). The scheme allows data producers to share their content in encrypted …
Networking (NDN). The scheme allows data producers to share their content in encrypted …
A temporal and spatial constrained attribute-based access control scheme for cloud storage
Cloud storage service allows data owners to store their (encrypted) data in a remote and
may be untrusted cloud server. Attribute-Based Encryption (ABE) provides an excellent and …
may be untrusted cloud server. Attribute-Based Encryption (ABE) provides an excellent and …
Efficient revocable cp-abe for big data access control in cloud computing
Due to huge volume of big data, cloud is a better choice to store big data. Since the cloud is
not trustworthy, privacy and access control is a big concern. Ciphertext policy attribute-based …
not trustworthy, privacy and access control is a big concern. Ciphertext policy attribute-based …