Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage

S Wang, S Jia, Y Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
In attribute-based searchable encryption (ABSE) scheme, data owners can encrypt their
data with access policy for security consideration, and encrypt keywords to obtain keyword …

Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage

J Sun, L Ren, S Wang, X Yao - IEEE Access, 2019 - ieeexplore.ieee.org
In a data sharing system, it is a basic requirement for a user, who has an appropriate
privilege to perform keyword retrieval for encrypted documents stored in the cloud. Although …

Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage

S Wang, K Guo, Y Zhang - PloS one, 2018 - journals.plos.org
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have
multiple attributes, and each attribute may be shared simultaneously by many users. The …

Time and attribute based dual access control and data integrity verifiable scheme in cloud computing applications

Q Zhang, S Wang, D Zhang, J Wang, Y Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
In the era of big data, cloud-based industrial applications can provide available and
convenient data access for resource-constrained smart devices. Attribute-based encryption …

Efficient CCA2 secure flexible and publicly-verifiable fine-grained access control in fog computing

D Li, J Liu, Q Wu, Z Guan - IEEE Access, 2019 - ieeexplore.ieee.org
Fog computing enables computation, storage, applications, and network services between
the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to …

[PDF][PDF] Authorized attribute-based encryption multi-keywords search with policy updating

M Ali, C Xu, A Hussain - Journal of New Media, 2020 - researchgate.net
Attribute-based encryption is cryptographic techniques that provide flexible data access
control to encrypted data content in cloud storage. Each trusted authority needs proper …

面向物联网的基于智能合约与CP-ABE 的访问控制方案

孙昌霞, 张传虎, 刘冰杰, 刘倩 - 电信科学, 2024 - infocomm-journal.com
随着物联网设备数量激增, 传统的集中式访问控制方案在面对当前大规模物联网环境时显得
力不从心, 现有的分布式访问控制方案存在高货币成本和处理访问请求的低吞吐量等问题 …

RETRACTED ARTICLE: Protecting user profile based on attribute-based encryption using multilevel access security by restricting unauthorization in the cloud …

V Vijayakumar, K Umadevi - Journal of Ambient Intelligence and …, 2021 - Springer
Data security in centralized storage needs advancement in privacy standards because of all
of the cloud. The data security in the cloud has been well provided by security industries like …

Large Universe Attribute-based Encryption with Multiple Authorities and Outsourced Decryption for Fog-enabled Internet of Things

A Peñuelas-Angulo, C Feregrino-Uribe… - 2023 Mexican …, 2023 - ieeexplore.ieee.org
Designers and users of Internet of Things (IoT) applications where data is stored in a cloud
server may have concerns about the cloud's honest-but-curious problem. Hence, to provide …

Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms”

S Wang, Q Zhang, Y Zhang, J Sun, J Chen, X Sun - PloS one, 2019 - journals.plos.org
Most recently, Kan Yang et al. proposed an attribute-keyword based encryption scheme for
data publish-subscribe service (AKPS), which is highly useful for cloud storage scenario …