[HTML][HTML] Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey

A Peñuelas-Angulo, C Feregrino-Uribe… - Internet of Things, 2023 - Elsevier
Attribute-based encryption (ABE) is a powerful cryptographic approach for providing fine-
grained access control and confidentiality security services. ABE is well suited for cloud …

Intelligent Music Wireless Signal Multi-feature Evaluation System Based on ABE Algorithm

D Zeng - … International Conference on Computer Simulation and …, 2023 - ieeexplore.ieee.org
The integration of music and artificial intelligence technology has brought more possibilities
to the music industry today. The application of artificial intelligence in music is reflected in …

Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme

MNS Perera, T Nakamura, T Matsunaka… - … Conference on Network …, 2023 - Springer
This paper delivers a post-quantum construction for group-oriented attribute-based
encryption (GO-ABE) using lattice-based cryptography. The GO-ABE scheme enables users …

[HTML][HTML] OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data

Y Zhao, Y Fan, X Bian - Mathematics, 2023 - mdpi.com
In many universities, students' physical ability data are collected and stored in the cloud
through various sensing devices to save computational and storage costs. Therefore, how to …

Access Control and Encryption Techniques during Big Data Accessing Stage

S Ahmed, A Dubey, A Rasool… - 2023 14th …, 2023 - ieeexplore.ieee.org
Privacy issues and data security are made worse by Big Data's velocity, volume, and variety.
Being able to extract information from enormous amounts of data has gained relevance. The …

Multilayer privacy‐preserving model for security and privacy access control in edge computing

K Karthikeyan, P Madhavan - Concurrency and Computation …, 2023 - Wiley Online Library
In a recent scenario of a computing environment, the Internet of Things (IoT) provides a
greater impact in several applications and services. For that Edge Computing techniques …

Implementing Hierarchical Attribute Set Based Encryption Over Key-Policy Attribute Based Encryption

P Surendran, B Thomas - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
The use of Internet and cloud storage is increasing daily and hence issues related to cloud
security are also increasing day-by-day. In this research, we are trying to find a solution that …

Privacy-Driven E2E Secure Data Exchange for Value Chains

A Mosteiro Sánchez - 2023 - addi.ehu.es
Digitalization is an unstoppable phenomenon that affects all facets of life and society. That
includes the industrial sector, where the paradigm is shifting towards distributed automated …

[PDF][PDF] Internet of Things

A Peñuelas-Angulo, C Feregrino-Uribe… - researchgate.net
Attribute-based encryption (ABE) is a powerful cryptographic approach for providing
finegrained access control and confidentiality security services. ABE is well suited for cloud …

[HTML][HTML] Разработка схемы контроля доступа к данным на основе иерархии ролей с использованием постквантовых математических преобразований

АВ Ярмак - Труды учебных заведений связи, 2022 - cyberleninka.ru
В работе представлена схема CSIDH-HRBAC, основанная на постквантовых
математических преобразованиях и позволяющая реализовать контроль доступа к …