Anonymous decentralized attribute-based access control for cloud-assisted IoT

H Nasiraee, M Ashouri-Talouki - Future Generation Computer Systems, 2020 - Elsevier
Abstract Attribute-Based Encryption (ABE) has emerged as powerful cryptographic tools to
bring fine-grained access control with widespread applications such as Cloud-assisted IoT …

Traceable Multiauthority Attribute‐Based Encryption with Outsourced Decryption and Hidden Policy for CIoT

S Liu, J Yu, C Hu, M Li - Wireless Communications and Mobile …, 2021 - Wiley Online Library
Cloud‐assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their
data for high efficient management. Unfortunately, some unsettled security issues …

Comments on “control cloud data access privilege and anonymity with fully anonymous attribute-based encryption”

H Ma, R Zhang, W Yuan - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Most of the known attribute-based encryption (ABE) schemes focused on the data contents
privacy and the access control, but less attention was paid to the privilege control and the …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things

Q Han, Y Zhang, H Li - Future Generation Computer Systems, 2018 - Elsevier
The term of Internet of Things (IoT) remarkably increases the ubiquity of the internet by
integrating smart object-based infrastructures. How to achieve efficient fine-grained data …

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Y Zhang, X Chen, J Li, DS Wong, H Li, I You - Information Sciences, 2017 - Elsevier
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …

Accountable and revocable large universe decentralized multi-authority attribute-based encryption for cloud-aided IoT

K Huang - IEEE Access, 2021 - ieeexplore.ieee.org
The data collected, stored, shared, and accessed across different platforms in the dynamic
IoT is mostly confidential and privacy-sensitive. Data security and access control issues …

Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot

S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia - Computer Networks, 2018 - Elsevier
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures
efficient data sharing among dynamic group of users. Nevertheless, this encryption …

Attribute-based access control scheme with efficient revocation in cloud computing

Z Xia, L Zhang, D Liu - China Communications, 2016 - ieeexplore.ieee.org
Attribute-based encryption (ABE) supports the fine-grained sharing of encrypted data. In
some common designs, attributes are managed by an attribute authority that is supposed to …

Privacy-preserving decentralized key-policy attribute-based encryption

J Han, W Susilo, Y Mu, J Yan - IEEE transactions on parallel …, 2012 - ieeexplore.ieee.org
Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme
where each authority can issue secret keys to the user independently without any …