CCA-secure ABE with outsourced decryption for fog computing

C Zuo, J Shao, G Wei, M Xie, M Ji - Future Generation Computer Systems, 2018 - Elsevier
Fog computing is not a replacement but an extension of cloud computing for the prevalence
of the Internet of Things (IoT) applications. In particular, fog computing inserts a middle layer …

Efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT

L Li, Z Wang, NA Li - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT
to provide efficient services by extending the cloud computing paradigm to the edge of the …

A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing

S Tu, M Waqas, F Huang, G Abbas, ZH Abbas - Computer Networks, 2021 - Elsevier
Fog computing is a revolutionary technology for the next generation to bridge the gap
between cloud data centers and end-users. Fog computing is not a counterfeit for cloud …

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

Y Jiang, W Susilo, Y Mu, F Guo - Future Generation Computer Systems, 2018 - Elsevier
Abstract In Fog Computing, fragile connection between Fog and Cloud causes problems of
the authentication and authorization. Recently, Stojmenovic, Wen, Huang and Luan …

An attribute-based encryption scheme to secure fog communications

A Alrawais, A Alhothaily, C Hu, X Xing, X Cheng - IEEE access, 2017 - ieeexplore.ieee.org
Fog computing is deemed as a highly virtualized paradigm that can enable computing at the
Internet of Things devices, residing in the edge of the network, for the purpose of delivering …

RMA-CPABE: A multi-authority CPABE scheme with reduced ciphertext size for IoT devices

CK Chaudhary, R Sarma, FA Barbhuiya - Future Generation Computer …, 2023 - Elsevier
Abstract Internet of Things (IoT) generates a massive amount of data, which can be prone to
huge data and privacy leaks unless given a proper access control. Ciphertext-policy attribute …

A secure and verifiable outsourced access control scheme in fog-cloud computing

K Fan, J Wang, X Wang, H Li, Y Yang - Sensors, 2017 - mdpi.com
With the rapid development of big data and Internet of things (IOT), the number of networking
devices and data volume are increasing dramatically. Fog computing, which extends cloud …

OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems

J Zhang, Z Cheng, X Cheng, B Chen - Connection Science, 2021 - Taylor & Francis
Fog computing is recently a novel distributed computing paradigm that performs a significant
achievement in the latency-sensitive smart Internet of Things (IoT) applications. However …

SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing

A Saidi, O Nouali, A Amira - Cluster Computing, 2022 - Springer
Attribute-based encryption (ABE) is an access control mechanism that ensures efficient data
sharing among dynamic groups of users by setting up access structures indicating who can …

Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things

Q Huang, Y Yang, L Wang - IEEE Access, 2017 - ieeexplore.ieee.org
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can
provide computation and storage services to end devices in Internet of Things (IoT). Attribute …