Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud

N Eltayieb, R Elhabob, A Hassan, F Li - Journal of Systems Architecture, 2020 - Elsevier
Traditional cloud data sharing schemes have relied on the architecture of the network and
large storage providers. However, these storage providers work as trusted third parties to …

A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing

YS Rao - Future Generation Computer Systems, 2017 - Elsevier
Abstract In recent years, Personal Health Record (PHR) system has attracted intensive
attention due to its universal accessibility and low cost. The practical deployment of PHR …

LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT

J Yu, S Liu, S Wang, Y Xiao… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
One of the best ways to deal with the massive data generated by the Internet of Things (IoT)
is storing them in the cloud. However, outsourced storage raises some security and privacy …

Efficient privacy-preserving access control scheme in electronic health records system

Y Ming, T Zhang - Sensors, 2018 - mdpi.com
The sharing of electronic health records (EHR) in cloud servers is an increasingly important
development that can improve the efficiency of medical systems. However, there are several …

Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment

S Bera, S Prasad, YS Rao, AK Das, Y Park - Journal of Information Security …, 2023 - Elsevier
The cloud computing technology is a novel storage and computing paradigm that enables
individuals and organizations to store data, share data with intended group of users and …

Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable

IA Obiri, Q Xia, H Xia, E Affum… - Journal of Computer …, 2022 - content.iospress.com
The distribution of personal health records (PHRs) via a cloud server is a promising platform
as it reduces the cost of data maintenance. Nevertheless, the cloud server is semi-trusted …

An elliptic curve signcryption scheme and its application

P Zhang, Y Li, H Chi - Wireless Communications and Mobile …, 2022 - Wiley Online Library
Two basic security requirements in communication are confidentiality and authentication.
Signcryption is an ideal technique to transmit encrypted and authenticated data. In view of …

Secure decentralized access control policy for data sharing in smart grid

Y Ye, L Zhang, W You, Y Mu - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Smart grid has improved the security, efficiency of the power system and balanced the
supply and demand by intelligent management, which enhanced stability and reliability of …

Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage

US Varri, SK Pasupuleti, KV Kadambari - Journal of Ambient Intelligence …, 2023 - Springer
Attribute-based searchable encryption (ABSE) allows only authorized users to perform a
keyword search over encrypted data in the cloud while preserving the data privacy and …