MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT

R Sarma, C Kumar, FA Barbhuiya - Journal of Systems Architecture, 2022 - Elsevier
With the rapid development of Internet of things (IoT), the number of connected devices and
the data generated by them are increasing dramatically. This led to the development of …

PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT

R Sarma, C Kumar, FA Barbhuiya - Sustainable Computing: Informatics …, 2021 - Elsevier
With the proliferation of data produced by IoT devices, a new paradigm called fog computing
has developed that allows processing and analysis of data at the edge. Together with fog …

RMA-CPABE: A multi-authority CPABE scheme with reduced ciphertext size for IoT devices

CK Chaudhary, R Sarma, FA Barbhuiya - Future Generation Computer …, 2023 - Elsevier
Abstract Internet of Things (IoT) generates a massive amount of data, which can be prone to
huge data and privacy leaks unless given a proper access control. Ciphertext-policy attribute …

A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT

R Sarma, FA Barbhuiya - Computers and Electrical Engineering, 2022 - Elsevier
The current era's technological innovation has accelerated the expansion of the Internet of
things (IoT), leading to an exponential growth of the number of connected devices and the …

An efficient access control scheme with outsourcing capability and attribute update for fog computing

P Zhang, Z Chen, JK Liu, K Liang, H Liu - Future Generation Computer …, 2018 - Elsevier
Fog computing as an extension of cloud computing provides computation, storage and
application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a …

ACS-FIT: A secure and efficient access control scheme for fog-enabled IoT

R Sarma, C Kumar, FA Barbhuiya - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The explosion of data generated by IoT devices encouraged the introduction of paradigm
fog computing, which facilitates computation and analysis at the edge. Alongside fog, cloud …

Efficient and privacy preserving access control scheme for fog-enabled IoT

K Fan, H Xu, L Gao, H Li, Y Yang - Future Generation Computer Systems, 2019 - Elsevier
The fog-to-things paradigm is introduced to mitigate the heavy burden on the edge of cloud-
based network due to the centralized processing and storing of the massive volume of IoT …

A secure and verifiable outsourced access control scheme in fog-cloud computing

K Fan, J Wang, X Wang, H Li, Y Yang - Sensors, 2017 - mdpi.com
With the rapid development of big data and Internet of things (IOT), the number of networking
devices and data volume are increasing dramatically. Fog computing, which extends cloud …

OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems

J Zhang, Z Cheng, X Cheng, B Chen - Connection Science, 2021 - Taylor & Francis
Fog computing is recently a novel distributed computing paradigm that performs a significant
achievement in the latency-sensitive smart Internet of Things (IoT) applications. However …

An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health

J Zhao, P Zeng, KKR Choo - IEEE Access, 2021 - ieeexplore.ieee.org
Fog computing is increasingly popular partly due to its capability to minimize data transfer
and latency requirements, for example by moving some of the computational operations …