A secure blockchain-assisted access control scheme for smart healthcare system in fog computing

J Li, D Li, X Zhang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
IoT-based smart healthcare system (SHS) allows doctors to monitor and diagnose patients
remotely, which can greatly ease overcrowding in the hospitals and disequilibrium of …

On the design of blockchain-based access control protocol for IoT-enabled healthcare applications

S Saha, AK Sutrala, AK Das, N Kumar… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Access control is one of the important security services that is essential for an Internet of
Things (IoT)-enabled authorized user using his/her smart mobile device to authenticate with …

Multiple access control scheme for EHRs combining edge computing with smart contracts

Y Yang, R Shi, K Li, Z Wu, S Wang - Future Generation Computer Systems, 2022 - Elsevier
To make up the insufficient computing power of remote medical devices and solve the
transmission delay problem, edge computing has been widely studied in academic …

OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems

J Zhang, Z Cheng, X Cheng, B Chen - Connection Science, 2021 - Taylor & Francis
Fog computing is recently a novel distributed computing paradigm that performs a significant
achievement in the latency-sensitive smart Internet of Things (IoT) applications. However …

Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing

S Fugkeaw, L Wirz, L Hak - IEEE Access, 2023 - ieeexplore.ieee.org
As for the advancement of IoT and cloud computing in healthcare, outsourcing encrypted
Electronic medical records (EMRs) created by the aggregation of medical treatment …

MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT

R Sarma, C Kumar, FA Barbhuiya - Journal of Systems Architecture, 2022 - Elsevier
With the rapid development of Internet of things (IoT), the number of connected devices and
the data generated by them are increasing dramatically. This led to the development of …

A secure and verifiable outsourced access control scheme in fog-cloud computing

K Fan, J Wang, X Wang, H Li, Y Yang - Sensors, 2017 - mdpi.com
With the rapid development of big data and Internet of things (IOT), the number of networking
devices and data volume are increasing dramatically. Fog computing, which extends cloud …

An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health

J Zhao, P Zeng, KKR Choo - IEEE Access, 2021 - ieeexplore.ieee.org
Fog computing is increasingly popular partly due to its capability to minimize data transfer
and latency requirements, for example by moving some of the computational operations …

CCA-secure ABE with outsourced decryption for fog computing

C Zuo, J Shao, G Wei, M Xie, M Ji - Future Generation Computer Systems, 2018 - Elsevier
Fog computing is not a replacement but an extension of cloud computing for the prevalence
of the Internet of Things (IoT) applications. In particular, fog computing inserts a middle layer …

Efficient and privacy preserving access control scheme for fog-enabled IoT

K Fan, H Xu, L Gao, H Li, Y Yang - Future Generation Computer Systems, 2019 - Elsevier
The fog-to-things paradigm is introduced to mitigate the heavy burden on the edge of cloud-
based network due to the centralized processing and storing of the massive volume of IoT …