Security in cloud computing: Opportunities and challenges
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
HSG Pussewalage, VA Oleshchuk - International Journal of Information …, 2016 - Elsevier
In the last few decades, there have been significant efforts in integrating information and
communication technologies (ICT) into healthcare practices. This new paradigm commonly …
communication technologies (ICT) into healthcare practices. This new paradigm commonly …
Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV
C Feng, K Yu, M Aloqaily, M Alazab… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge intelligence is an emerging concept referring to processes in which data are collected
and analyzed and insights are delivered close to where the data are captured in a network …
and analyzed and insights are delivered close to where the data are captured in a network …
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
Cloud computing has emerged as one of the most influential paradigms in the IT industry in
recent years. Since this new computing technology requires users to entrust their valuable …
recent years. Since this new computing technology requires users to entrust their valuable …
TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage
Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool
to guarantee data owners' direct control over their data in public cloud storage. The earlier …
to guarantee data owners' direct control over their data in public cloud storage. The earlier …
Multi-authority fine-grained access control with accountability and its application in cloud
Attribute-based encryption (ABE) is one of critical primitives for the application of fine-
grained access control. To reduce the trust assumption on the attribute authority and in the …
grained access control. To reduce the trust assumption on the attribute authority and in the …
An attribute-based controlled collaborative access control scheme for public cloud storage
In public cloud storage services, data are outsourced to semi-trusted cloud servers which
are outside of data owners' trusted domain. To prevent untrustworthy service providers from …
are outside of data owners' trusted domain. To prevent untrustworthy service providers from …
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues
With the thriving growth of the cloud computing, the security and privacy concerns of
outsourcing data have been increasing dramatically. However, because of delegating the …
outsourcing data have been increasing dramatically. However, because of delegating the …
Security and privacy in remote healthcare: Issues, solutions, and standards
Remote healthcare machinery such as telemedicine and remote monitoring are the potential
solution to the problems of rural health care which suffers from the lack of medical …
solution to the problems of rural health care which suffers from the lack of medical …
Ciphertext policy attribute-based proxy re-encryption
S Luo, J Hu, Z Chen - … Security: 12th International Conference, ICICS 2010 …, 2010 - Springer
We present a novel ciphertext policy attribute-based proxy re-encryption (CP-AB-PRE)
scheme. The ciphertext policy realized in our scheme is AND-gates policy supporting multi …
scheme. The ciphertext policy realized in our scheme is AND-gates policy supporting multi …