Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things

P Zeng, Z Zhang, R Lu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Modern day medical systems are closely integrated and interconnected with other systems,
such as those comprising Internet-of-Medical Things (IoMT) devices that facilitate remote …

Efficient and privacy-preserving traceable attribute-based encryption in blockchain

A Wu, Y Zhang, X Zheng, R Guo, Q Zhao… - Annals of …, 2019 - Springer
Attribute-based encryption, especially ciphertext-policy attribute-based encryption, plays an
important role in the data sharing. In the process of data sharing, the secret key does not …

TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain

Y Zhang, RH Deng, J Shu, K Yang, D Zheng - IEEE Access, 2018 - ieeexplore.ieee.org
As a very attractive computing paradigm, cloud computing makes it possible for resource-
constrained users to enjoy cost-effective and flexible resources of diversity. Considering the …

[HTML][HTML] Privacy and data protection in mobile cloud computing: A systematic mapping study

HM Alnajrani, AA Norman, BH Ahmed - Plos one, 2020 - journals.plos.org
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things

Y Zhang, RH Deng, G Han, D Zheng - Journal of Network and Computer …, 2018 - Elsevier
With the rapid technological advancements in the Internet of Things (IoT), wireless
communication and cloud computing, smart health is expected to enable comprehensive …

[HTML][HTML] Privacy-preserving data aggregation against false data injection attacks in fog computing

Y Zhang, J Zhao, D Zheng, K Deng, F Ren, X Zheng… - Sensors, 2018 - mdpi.com
As an extension of cloud computing, fog computing has received more attention in recent
years. It can solve problems such as high latency, lack of support for mobility and location …

[HTML][HTML] Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing

A Wu, D Zheng, Y Zhang, M Yang - Sensors, 2018 - mdpi.com
Attribute-based encryption can be used to realize fine-grained data sharing in open
networks. However, in practical applications, we have to address further challenging issues …

Efficient and secure big data storage system with leakage resilience in cloud computing

Y Zhang, M Yang, D Zheng, P Lang, A Wu, C Chen - Soft Computing, 2018 - Springer
With recent advancements in wireless smart terminal manufacture and communication
technologies, a huge amount of data are generated from a variety of sources including …

A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth

S Xu, J Zhong, L Wang, D He, S Zhang… - Connection …, 2023 - Taylor & Francis
The mobile healthcare (mHealth) is a promising and fascinating paradigm, which can
dramatically improve the quality of healthcare delivery by providing remote diagnosis and …