An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system

J Cui, F Bian, H Zhong, Q Zhang, S Xu… - IEEE Systems …, 2022 - ieeexplore.ieee.org
With the application of the Internet of Things and intelligent technologies in industrial
systems, the manufacturing efficiency and product quality have been improved, leading to …

A lightweight and verifiable access control scheme with constant size ciphertext in edge-computing-assisted IoT

X Li, T Liu, C Chen, Q Cheng, X Zhang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
As an extension of cloud computing, edge computing has attracted the attention of academia
and industry because of its characteristics of low latency, high bandwidth, and low energy …

Traceable Multiauthority Attribute‐Based Encryption with Outsourced Decryption and Hidden Policy for CIoT

S Liu, J Yu, C Hu, M Li - Wireless Communications and Mobile …, 2021 - Wiley Online Library
Cloud‐assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their
data for high efficient management. Unfortunately, some unsettled security issues …

Anonymous decentralized attribute-based access control for cloud-assisted IoT

H Nasiraee, M Ashouri-Talouki - Future Generation Computer Systems, 2020 - Elsevier
Abstract Attribute-Based Encryption (ABE) has emerged as powerful cryptographic tools to
bring fine-grained access control with widespread applications such as Cloud-assisted IoT …

Outsourced multi-authority ABE with white-box traceability for cloud-IoT

S Liu, J Yu, C Hu, M Li - … , WASA 2020, Qingdao, China, September 13–15 …, 2020 - Springer
Some unsettled security issues, such as illegal data access and secret key leakage,
dramatically impact the popularity of cloud-assisted Internet of Things (Cloud-IoT). The …

Secure, efficient, and weighted access control for cloud-assisted industrial IoT

Q Li, Q Zhang, H Huang, W Zhang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
In the cloud-assisted Industrial Internet of Things (IIoT), ciphertext-policy attribute-based
encryption (CP-ABE) could help the data owner (DO) share his sensitive data via the cloud …

Practical Multiauthority Attribute‐Based Access Control for Edge‐Cloud‐Aided Internet of Things

K Huang, X Wang, Z Lin - Security and Communication …, 2021 - Wiley Online Library
With the assistance of edge computing which reduces the heavy burden of the cloud center
server by using the network edge servers, the Internet of Things (IoTs) architectures enable …

[HTML][HTML] An attribute-based access control scheme using blockchain technology for IoT data protection

ZH Yang, XB Chen, YF He, LX Liu, YM Che… - High-Confidence …, 2024 - Elsevier
With the wide application of the Internet of Things (IoT), storing large amounts of IoT data
and protecting data privacy has become a meaningful issue. In general, the access control …

Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment

S Banerjee, S Roy, V Odelu, AK Das… - Journal of Information …, 2020 - Elsevier
With the ever-increasing rate of adoption of internet-enabled smart devices, the allure of
greater integration of technologies, such as smart home, smart city, and smart grid into …

TMO: time domain outsourcing attribute-based encryption scheme for data acquisition in edge computing

Y Li, Z Dong, K Sha, C Jiang, J Wan, Y Wang - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of the Internet of Things and the ever-increasing demands of
advanced services and applications, edge computing is proposed to move the computing …