An efficient access control scheme with outsourcing capability and attribute update for fog computing

P Zhang, Z Chen, JK Liu, K Liang, H Liu - Future Generation Computer …, 2018 - Elsevier
Fog computing as an extension of cloud computing provides computation, storage and
application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a …

Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things

Q Huang, Y Yang, L Wang - IEEE Access, 2017 - ieeexplore.ieee.org
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can
provide computation and storage services to end devices in Internet of Things (IoT). Attribute …

SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing

A Saidi, O Nouali, A Amira - Cluster Computing, 2022 - Springer
Attribute-based encryption (ABE) is an access control mechanism that ensures efficient data
sharing among dynamic groups of users by setting up access structures indicating who can …

An efficient and fine-grained big data access control scheme with privacy-preserving policy

K Yang, Q Han, H Li, K Zheng, Z Su… - IEEE Internet of Things …, 2016 - ieeexplore.ieee.org
How to control the access of the huge amount of big data becomes a very challenging issue,
especially when big data are stored in the cloud. Ciphertext-policy attribute-based …

HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing

Z Wan, RH Deng - IEEE transactions on information forensics …, 2011 - ieeexplore.ieee.org
Cloud computing has emerged as one of the most influential paradigms in the IT industry in
recent years. Since this new computing technology requires users to entrust their valuable …

Enabling efficient access control with dynamic policy updating for big data in the cloud

K Yang, X Jia, K Ren, R Xie… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
Due to the high volume and velocity of big data, it is an effective option to store big data in
the cloud, because the cloud has capabilities of storing big data and processing high …

[HTML][HTML] MLS-ABAC: Efficient multi-level security attribute-based access control scheme

SF Aghili, M Sedaghat, D Singelée, M Gupta - Future Generation Computer …, 2022 - Elsevier
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet
of Things, where various devices with low computational power and different security levels …

A secure and verifiable outsourced access control scheme in fog-cloud computing

K Fan, J Wang, X Wang, H Li, Y Yang - Sensors, 2017 - mdpi.com
With the rapid development of big data and Internet of things (IOT), the number of networking
devices and data volume are increasing dramatically. Fog computing, which extends cloud …

Fine-grained access control system based on outsourced attribute-based encryption

J Li, X Chen, J Li, C Jia, J Ma, W Lou - … Egham, UK, September 9-13, 2013 …, 2013 - Springer
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …

Fine-grained data access control with attribute-hiding policy for cloud-based IoT

J Hao, C Huang, J Ni, H Rong, M Xian, XS Shen - Computer Networks, 2019 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve
fine-grained access control over the outsourced data in Internet of Things (IoT). However, in …