Extended file hierarchy access control scheme with attribute-based encryption in cloud computing

J Li, N Chen, Y Zhang - IEEE Transactions on Emerging Topics …, 2019 - ieeexplore.ieee.org
In cloud computing, attribute based encryption (ABE) is often used to solve the challenging
issue in secure data storage. In order to lighten the burden of authority center, hierarchical …

Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system

J Liu, Y Fan, R Sun, L Liu, C Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Due to the massive applications of Internet of Things (IoT) and the prevalence of wearable
devices, e-healthcare systems are widely deployed in medical institutions. As a significant …

Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage

Y Miao, Q Tong, RH Deng, KKR Choo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving
data confidentiality securely. Many SE solutions have been designed to improve efficiency …

A survey on public key encryption with keyword search: Taxonomy and methods

MH Noorallahzade, R Alimoradi… - International Journal of …, 2022 - Wiley Online Library
Given the many benefits that cloud computing brings, organizations tend to outsource most
of their data to reduce a large portion of their costs, but concern about the privacy of data is a …

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage

X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng - Information Sciences, 2019 - Elsevier
Public-key encryption with keyword search (PEKS) enables users to search over encrypted
data and retrieve target data efficiently. However, most of existing PEKS schemes are …

Secure online/offline data sharing framework for cloud-assisted industrial Internet of Things

Y Miao, Q Tong, KKR Choo, X Liu… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Ciphertext-policy attribute-based keyword search (CP-ABKS) schemes facilitate the fine-
grained keyword search over encrypted data, such as those sensed/collected from Industrial …

Multi-keyword searchable and verifiable attribute-based encryption over cloud data

Y Zhang, T Zhu, R Guo, S Xu, H Cui… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In cloud data sharing systems, Searchable Encryption (SE) schemes ensure data
confidentiality with retrieving, but it faces several issues in practice. First, most of the …

Verifiable online/offline multi-keyword search for cloud-assisted industrial internet of things

M Ali, MR Sadeghi, X Liu, Y Miao… - Journal of Information …, 2022 - Elsevier
Attribute-based encryption (ABE) and attribute-based keyword search (ABKS) facilitate fine-
grained access and search control for cloud-assisted Industrial Internet of Things (IIoT) …

Optimized verifiable fine-grained keyword search in dynamic multi-owner settings

Y Miao, RH Deng, KKR Choo, X Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) schemes support both fine-
grained access control and keyword-based ciphertext retrieval, which make these schemes …

Hybrid keyword-field search with efficient key management for industrial internet of things

Y Miao, X Liu, RH Deng, H Wu, H Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Equipped with the emerging cloud computing, clients prefer to outsource the increasing
number of Industrial Internet of things (IIoT) data to cloud to reduce the high storage and …