Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud

G Pareek, BR Purushothama - International Conference on Information …, 2018 - Springer
We consider a model where large number of data items, each with different access
privileges for a set of users, is outsourced and access is to be granted according to the …

Flexible, secure, and reliable data sharing service based on collaboration in multicloud environment

Q Wei, H Shao, G Zhang - Wireless Communications and …, 2018 - Wiley Online Library
Due to the abundant storage resources and high reliability data service of cloud computing,
more individuals and enterprises are motivated to outsource their data to public cloud …

Fully secure hidden ciphertext-policy attribute-based proxy re-encryption

X Feng, C Li, D Li, Y Fang, Q Shen - … 2017, Beijing, China, December 6-8 …, 2018 - Springer
We propose a hidden ciphertext-policy attribute-based proxy re-encryption scheme. A data
owner can delegate the capability of transforming a ciphertext under an access policy to …

Securing communication data in pervasive social networking based on trust with KP-ABE

N Li, Z Yan, M Wang, LT Yang - ACM Transactions on Cyber-Physical …, 2018 - dl.acm.org
Pervasive Social Networking (PSN) intends to support instant social activities in a pervasive
way at any time and anywhere. In order to protect crucial social activities, ensure …

[引用][C] High-capacity and lossless reversible data hiding for encrypted multimedia data in cloud computing

L Xiong, Z Xu - Journal of Internet Technology, 2018

Adaptively secure proxy re-encryption

G Fuchsbauer, C Kamath, K Klein… - Cryptology ePrint …, 2018 - eprint.iacr.org
A proxy re-encryption (PRE) scheme is a public-key encryption scheme that allows the
holder of a key pk to derive a re-encryption key for any other key pk'. This re-encryption key …

[图书][B] A secure and privacy-preserving incentive framework for vehicular cloud

A Alamer - 2018 - search.proquest.com
Abstract Vehicular Cloud Computing (VCC) plays a critical role in data generation where a
large number of vehicles collect various kinds of sensing resources with large-volume …

Key management and data re-encryption schemes for secure in-vehicle network

YH Park - Journal of intelligent & fuzzy systems, 2018 - content.iospress.com
With the development of intelligent vehicles, in-vehicle security and privacy receive
considerable attention from researchers and drivers. The data stored in a vehicle control unit …

[图书][B] Privacy-enhancing fog computing and its applications

X Lin, J Ni, Xuemin (Sherman) Shen - 2018 - Springer
Fog computing has been considered as a key enabler to reach the increasing demands on
local data analysis and numerous device connections for Internetof-Things (IoT), by …

Cloud-assisted privacy-preserving classification for IOT applications

L Yang, F Li - 2018 IEEE Conference on Communications and …, 2018 - ieeexplore.ieee.org
The explosive proliferation of Internet of Things (IoT) devices is generating an
incomprehensible amount of data. Machine learning plays an imperative role in aggregating …