Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system

P Chinnasamy, P Deepalakshmi, AK Dutta, J You… - Mathematics, 2021 - mdpi.com
People can store their data on servers in cloud computing and allow public users to access
data via data centers. One of the most difficult tasks is to provide security for the access …

Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud

T Kanwal, A Anjum, SUR Malik, A Khan… - Computer Standards & …, 2021 - Elsevier
An increasing trend in healthcare organizations to outsource EHRs' data to the cloud
highlights new challenges regarding the privacy of given individuals. Healthcare …

Efficient location privacy-preserving range query scheme for vehicle sensing systems

P Hu, Y Wang, Q Li, Y Wang, Y Li, R Zhao… - Journal of Systems …, 2020 - Elsevier
Vehicle sensing systems (VSS) has received widespread concern in recent years. However,
implementing data query efficiently while protecting data privacy in VSS is a challenge. Our …

[PDF][PDF] Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme

SDM Satar, M Hussin, ZM Hanapi… - Int. J. Adv. Comput. Sci …, 2021 - academia.edu
Cloud computing is an emerging technology that has been used to provide better healthcare
services to the users because of its convenient and economical features. Noted that the …

Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption

SD Mohd Satar, M Hussin, ZM Hanapi, MA Mohamed - Future Internet, 2021 - mdpi.com
Managing and controlling access to the tremendous data in Cloud storage is very
challenging. Due to various entities engaged in the Cloud environment, there is a high …

Privacy-aware relationship semantics–based XACML access control model for electronic health records in hybrid cloud

T Kanwal, AA Jabbar, A Anjum… - International …, 2019 - journals.sagepub.com
State-of-the-art progress in cloud computing encouraged the healthcare organizations to
outsource the management of electronic health records to cloud service providers using …

A fine-grained access control scheme for electronic health records based on roles and attributes

S Zhang, S Yang, G Zhu, E Luo, J Zhang… - … Conference on Ubiquitous …, 2021 - Springer
The electronic medical cloud system has shown its potential to improve the quality of
medical care and personal life. At present, there are mainly two forms of access control to …

Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment

QW Ahmed, S Garg - Journal of Grid Computing, 2022 - Springer
The ever-increasing use of cloud computing and services has raised questions of securely
accessing data. Security concernsare a significant hurdle to storing large-scale data in the …

Ciphertext-policy attribute based encryption with selectively-hidden access policy

G Arkin, N Helil - Computing and Informatics, 2021 - cai.sk
Abstract In conventional Ciphertext-Policy Attribute-Based Encryption (CP-ABE), the access
policy appears in plaintext form that might reveal confidential user information and violate …

Strategies for implementing successful IT security systems in small businesses

MD Idahosa - 2020 - search.proquest.com
Owners of small businesses who do not adequately protect business data are at high risk for
a cyber attack. As data breaches against small businesses have increased, it has become a …