Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud
G Pareek, BR Purushothama - International Conference on Information …, 2018 - Springer
We consider a model where large number of data items, each with different access
privileges for a set of users, is outsourced and access is to be granted according to the …
privileges for a set of users, is outsourced and access is to be granted according to the …
Flexible, secure, and reliable data sharing service based on collaboration in multicloud environment
Q Wei, H Shao, G Zhang - Wireless Communications and …, 2018 - Wiley Online Library
Due to the abundant storage resources and high reliability data service of cloud computing,
more individuals and enterprises are motivated to outsource their data to public cloud …
more individuals and enterprises are motivated to outsource their data to public cloud …
Fully secure hidden ciphertext-policy attribute-based proxy re-encryption
X Feng, C Li, D Li, Y Fang, Q Shen - … 2017, Beijing, China, December 6-8 …, 2018 - Springer
We propose a hidden ciphertext-policy attribute-based proxy re-encryption scheme. A data
owner can delegate the capability of transforming a ciphertext under an access policy to …
owner can delegate the capability of transforming a ciphertext under an access policy to …
Securing communication data in pervasive social networking based on trust with KP-ABE
Pervasive Social Networking (PSN) intends to support instant social activities in a pervasive
way at any time and anywhere. In order to protect crucial social activities, ensure …
way at any time and anywhere. In order to protect crucial social activities, ensure …
Adaptively secure proxy re-encryption
G Fuchsbauer, C Kamath, K Klein… - Cryptology ePrint …, 2018 - eprint.iacr.org
A proxy re-encryption (PRE) scheme is a public-key encryption scheme that allows the
holder of a key pk to derive a re-encryption key for any other key pk'. This re-encryption key …
holder of a key pk to derive a re-encryption key for any other key pk'. This re-encryption key …
[图书][B] A secure and privacy-preserving incentive framework for vehicular cloud
A Alamer - 2018 - search.proquest.com
Abstract Vehicular Cloud Computing (VCC) plays a critical role in data generation where a
large number of vehicles collect various kinds of sensing resources with large-volume …
large number of vehicles collect various kinds of sensing resources with large-volume …
Key management and data re-encryption schemes for secure in-vehicle network
YH Park - Journal of intelligent & fuzzy systems, 2018 - content.iospress.com
With the development of intelligent vehicles, in-vehicle security and privacy receive
considerable attention from researchers and drivers. The data stored in a vehicle control unit …
considerable attention from researchers and drivers. The data stored in a vehicle control unit …
[图书][B] Privacy-enhancing fog computing and its applications
Fog computing has been considered as a key enabler to reach the increasing demands on
local data analysis and numerous device connections for Internetof-Things (IoT), by …
local data analysis and numerous device connections for Internetof-Things (IoT), by …
Cloud-assisted privacy-preserving classification for IOT applications
The explosive proliferation of Internet of Things (IoT) devices is generating an
incomprehensible amount of data. Machine learning plays an imperative role in aggregating …
incomprehensible amount of data. Machine learning plays an imperative role in aggregating …