A lightweight and verifiable access control scheme with constant size ciphertext in edge-computing-assisted IoT

X Li, T Liu, C Chen, Q Cheng, X Zhang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
As an extension of cloud computing, edge computing has attracted the attention of academia
and industry because of its characteristics of low latency, high bandwidth, and low energy …

Secure, efficient, and weighted access control for cloud-assisted industrial IoT

Q Li, Q Zhang, H Huang, W Zhang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
In the cloud-assisted Industrial Internet of Things (IIoT), ciphertext-policy attribute-based
encryption (CP-ABE) could help the data owner (DO) share his sensitive data via the cloud …

Practical Multiauthority Attribute‐Based Access Control for Edge‐Cloud‐Aided Internet of Things

K Huang, X Wang, Z Lin - Security and Communication …, 2021 - Wiley Online Library
With the assistance of edge computing which reduces the heavy burden of the cloud center
server by using the network edge servers, the Internet of Things (IoTs) architectures enable …

Traceable Multiauthority Attribute‐Based Encryption with Outsourced Decryption and Hidden Policy for CIoT

S Liu, J Yu, C Hu, M Li - Wireless Communications and Mobile …, 2021 - Wiley Online Library
Cloud‐assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their
data for high efficient management. Unfortunately, some unsettled security issues …

[HTML][HTML] A secure and verifiable outsourced access control scheme in fog-cloud computing

K Fan, J Wang, X Wang, H Li, Y Yang - Sensors, 2017 - mdpi.com
With the rapid development of big data and Internet of things (IOT), the number of networking
devices and data volume are increasing dramatically. Fog computing, which extends cloud …

An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system

J Cui, F Bian, H Zhong, Q Zhang, S Xu… - IEEE Systems …, 2022 - ieeexplore.ieee.org
With the application of the Internet of Things and intelligent technologies in industrial
systems, the manufacturing efficiency and product quality have been improved, leading to …

Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT

M Xiao, Q Huang, W Chen, C Lyu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The cloud-edge collaborative data sharing supporting data confidentiality can be realized by
adopting outsourced Attribute-Based Encryption (ABE) schemes. Yet, most existing schemes …

[HTML][HTML] Efficient access control with traceability and user revocation in IoT

Y Wu, W Zhang, H Xiong, Z Qin, KH Yeh - Multimedia Tools and …, 2021 - Springer
With the universality and availability of Internet of Things (IoT), data privacy protection in IoT
has become a hot issue. As a branch of attribute-based encryption (ABE), ciphertext policy …

[HTML][HTML] MLS-ABAC: Efficient multi-level security attribute-based access control scheme

SF Aghili, M Sedaghat, D Singelée, M Gupta - Future Generation Computer …, 2022 - Elsevier
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet
of Things, where various devices with low computational power and different security levels …

SEM-ACSIT: secure and efficient multiauthority access control for IoT cloud storage

S Xiong, Q Ni, L Wang, Q Wang - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Data access control in a cloud storage system is regarded as a promising technique for
enhanced efficiency and security utilizing a ciphertext-policy attribute-based encryption (CP …