Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions

I Gupta, AK Singh, CN Lee, R Buyya - IEEE Access, 2022 - ieeexplore.ieee.org
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …

A survey on security and privacy issues in edge-computing-assisted internet of things

A Alwarafy, KA Al-Thelaya, M Abdallah… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an innovative paradigm envisioned to provide massive
applications that are now part of our daily lives. Millions of smart devices are deployed within …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2017 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds

C Ge, W Susilo, J Baek, Z Liu, J Xia… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

[HTML][HTML] A survey of security architectures for edge computing-based IoT

E Fazeldehkordi, TM Grønli - IoT, 2022 - mdpi.com
The Internet of Things (IoT) is an innovative scheme providing massive applications that
have become part of our daily lives. The number of IoT and connected devices are growing …

Identity-based encryption transformation for flexible sharing of encrypted data in public cloud

H Deng, Z Qin, Q Wu, Z Guan, RH Deng… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the rapid development of cloud computing, an increasing number of individuals and
organizations are sharing data in the public cloud. To protect the privacy of data stored in the …

[PDF][PDF] 边缘计算数据安全与隐私保护研究综述

张佳乐, 赵彦超, 陈兵, 胡峰… - Journal on …, 2018 - infocomm-journal.com
随着物联网, 大数据和5G 网络的快速发展和广泛应用, 传统的云计算无法处理网络边缘设备所
产生的海量数据, 因此, 边缘计算应运而生. 然而, 由于边缘计算的内容感知, 实时计算 …