Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

HSG Pussewalage, VA Oleshchuk - International Journal of Information …, 2016 - Elsevier
In the last few decades, there have been significant efforts in integrating information and
communication technologies (ICT) into healthcare practices. This new paradigm commonly …

Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV

C Feng, K Yu, M Aloqaily, M Alazab… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge intelligence is an emerging concept referring to processes in which data are collected
and analyzed and insights are delivered close to where the data are captured in a network …

HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing

Z Wan, RH Deng - IEEE transactions on information forensics …, 2011 - ieeexplore.ieee.org
Cloud computing has emerged as one of the most influential paradigms in the IT industry in
recent years. Since this new computing technology requires users to entrust their valuable …

TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage

W Li, K Xue, Y Xue, J Hong - IEEE Transactions on parallel and …, 2015 - ieeexplore.ieee.org
Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool
to guarantee data owners' direct control over their data in public cloud storage. The earlier …

Multi-authority fine-grained access control with accountability and its application in cloud

J Li, X Chen, SSM Chow, Q Huang, DS Wong… - Journal of Network and …, 2018 - Elsevier
Attribute-based encryption (ABE) is one of critical primitives for the application of fine-
grained access control. To reduce the trust assumption on the attribute authority and in the …

An attribute-based controlled collaborative access control scheme for public cloud storage

Y Xue, K Xue, N Gai, J Hong, DSL Wei… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In public cloud storage services, data are outsourced to semi-trusted cloud servers which
are outside of data owners' trusted domain. To prevent untrustworthy service providers from …

Attribute-based data access control in mobile cloud computing: Taxonomy and open issues

M Sookhak, FR Yu, MK Khan, Y Xiang… - Future Generation …, 2017 - Elsevier
With the thriving growth of the cloud computing, the security and privacy concerns of
outsourcing data have been increasing dramatically. However, because of delegating the …

Security and privacy in remote healthcare: Issues, solutions, and standards

PKD Pramanik, G Pareek, A Nayyar - Telemedicine technologies, 2019 - Elsevier
Remote healthcare machinery such as telemedicine and remote monitoring are the potential
solution to the problems of rural health care which suffers from the lack of medical …

Ciphertext policy attribute-based proxy re-encryption

S Luo, J Hu, Z Chen - … Security: 12th International Conference, ICICS 2010 …, 2010 - Springer
We present a novel ciphertext policy attribute-based proxy re-encryption (CP-AB-PRE)
scheme. The ciphertext policy realized in our scheme is AND-gates policy supporting multi …