Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
A survey on attribute-based encryption schemes suitable for the internet of things
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …
Efficient revocable attribute-based encryption with verifiable data integrity
S Chen, J Li, Y Zhang, J Han - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Nowadays, cloud computing and cloud storage services that can reduce the local workload
are becoming increasingly popular, allowing individual and corporate users to upload data …
are becoming increasingly popular, allowing individual and corporate users to upload data …
Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
Redactable blockchain in decentralized setting
Immutability has been widely accepted as a fundamental property protecting the security of
blockchain technology. However, this property impedes the development of blockchain …
blockchain technology. However, this property impedes the development of blockchain …
Efficient data access control with fine-grained data protection in cloud-assisted IIoT
The Industrial Internet of Things (IIoT) has provided a promising opportunity to build
digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency …
digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency …
K-Time Modifiable and Epoch-Based Redactable Blockchain
As an immutable append-only distributed ledger, blockchain allows a group of participants
to reach a consensus in an untrustworthy ecosystem. Immutability is a blockchain feature …
to reach a consensus in an untrustworthy ecosystem. Immutability is a blockchain feature …
LBAC: A lightweight blockchain-based access control scheme for the internet of things
Attribute-based encryption (ABE) is considered to be one of the most suitable schemes for
cryptographic access control in the big data environment. But it still faces many challenges …
cryptographic access control in the big data environment. But it still faces many challenges …
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to
provide a variety of on-demand data services via the edge network. Many cryptographic …
provide a variety of on-demand data services via the edge network. Many cryptographic …
Privacy-preserving bilateral fine-grained access control for cloud-enabled industrial IoT healthcare
The expeditious development in cloud-enabled industrial Internet of Things (IIoT) healthcare
has significantly reduced the costs to monitor and protect people at home while notably …
has significantly reduced the costs to monitor and protect people at home while notably …