Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage

S Wang, K Guo, Y Zhang - PloS one, 2018 - journals.plos.org
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have
multiple attributes, and each attribute may be shared simultaneously by many users. The …

A searchable personal health records framework with fine-grained access control in cloud-fog computing

J Sun, X Wang, S Wang, L Ren - PLoS One, 2018 - journals.plos.org
Fog computing can extend cloud computing to the edge of the network so as to reduce
latency and network congestion. However, existing encryption schemes were rarely used in …

Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing

H Qiao, J Ren, Z Wang, H Ba, H Zhou - Future Generation Computer …, 2018 - Elsevier
Due to the structure of fog systems, ciphertext-policy attribute-based encryption (CP-ABE) is
regarded as a promising technique to address certain security problems present in the fog …

Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage

H Qiao, H Ba, H Zhou, Z Wang, J Ren, Y Hu - Symmetry, 2018 - mdpi.com
Cryptographic cloud storage (CCS) is a secure architecture built in the upper layer of a
public cloud infrastructure. In the CCS system, a user can define and manage the access …

Information security of smart factories

RA Iureva, YS Andreev, AM Iuvshin… - Journal of Physics …, 2018 - iopscience.iop.org
In several years, technologies and systems based on the Internet of things (IoT) will be
widely used in all smart factories. When processing a huge array of unstructured data, their …