OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems

J Zhang, Z Cheng, X Cheng, B Chen - Connection Science, 2021 - Taylor & Francis
Fog computing is recently a novel distributed computing paradigm that performs a significant
achievement in the latency-sensitive smart Internet of Things (IoT) applications. However …

Efficient and privacy preserving access control scheme for fog-enabled IoT

K Fan, H Xu, L Gao, H Li, Y Yang - Future Generation Computer Systems, 2019 - Elsevier
The fog-to-things paradigm is introduced to mitigate the heavy burden on the edge of cloud-
based network due to the centralized processing and storing of the massive volume of IoT …

An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health

J Zhao, P Zeng, KKR Choo - IEEE Access, 2021 - ieeexplore.ieee.org
Fog computing is increasingly popular partly due to its capability to minimize data transfer
and latency requirements, for example by moving some of the computational operations …

PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT

R Sarma, C Kumar, FA Barbhuiya - Sustainable Computing: Informatics …, 2021 - Elsevier
With the proliferation of data produced by IoT devices, a new paradigm called fog computing
has developed that allows processing and analysis of data at the edge. Together with fog …

MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT

R Sarma, C Kumar, FA Barbhuiya - Journal of Systems Architecture, 2022 - Elsevier
With the rapid development of Internet of things (IoT), the number of connected devices and
the data generated by them are increasing dramatically. This led to the development of …

A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT

R Sarma, FA Barbhuiya - Computers and Electrical Engineering, 2022 - Elsevier
The current era's technological innovation has accelerated the expansion of the Internet of
things (IoT), leading to an exponential growth of the number of connected devices and the …

A secure and verifiable outsourced access control scheme in fog-cloud computing

K Fan, J Wang, X Wang, H Li, Y Yang - Sensors, 2017 - mdpi.com
With the rapid development of big data and Internet of things (IOT), the number of networking
devices and data volume are increasing dramatically. Fog computing, which extends cloud …

SPMAC: Secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage

R Ma, L Zhang - Journal of Systems Architecture, 2023 - Elsevier
The fog computing paradigm extends the storage, network and computing facilities of the
Internet of Things (IoT) to the edge of the network and provides increased convenience in …

Efficient CCA2 secure flexible and publicly-verifiable fine-grained access control in fog computing

D Li, J Liu, Q Wu, Z Guan - IEEE Access, 2019 - ieeexplore.ieee.org
Fog computing enables computation, storage, applications, and network services between
the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to …

An efficient access control scheme with outsourcing capability and attribute update for fog computing

P Zhang, Z Chen, JK Liu, K Liang, H Liu - Future Generation Computer …, 2018 - Elsevier
Fog computing as an extension of cloud computing provides computation, storage and
application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a …