An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things

H Li, K Yu, B Liu, C Feng, Z Qin… - IEEE journal of …, 2021 - ieeexplore.ieee.org
The Internet of Health Things (IoHT) is a medical concept that describes uniquely identifiable
devices connected to the Internet that can communicate with each other. As one of the most …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Y Zhang, X Chen, J Li, DS Wong, H Li, I You - Information Sciences, 2017 - Elsevier
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

Attribute-based keyword search over hierarchical data in cloud computing

Y Miao, J Ma, X Liu, X Li, Q Jiang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Searchable encryption (SE) has been a promising technology which allows users to perform
search queries over encrypted data. However, the most of existing SE schemes cannot deal …

Attribute-based data sharing scheme revisited in cloud computing

S Wang, K Liang, JK Liu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption
technique for secure data sharing in the context of cloud computing. Data owner is allowed …

Secure and fine-grained access control on e-healthcare records in mobile cloud computing

Y Liu, Y Zhang, J Ling, Z Liu - Future Generation Computer Systems, 2018 - Elsevier
In the era of Internet of things, wearable devices can be used to monitor residents' health
and upload collected health data to cloud servers for sharing, which facilitates the …

[PDF][PDF] Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography.

B Murugeshwari, D Selvaraj… - … Automation & Soft …, 2023 - cdn.techscience.cn
Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique
that protects the privacy of individual data while mining those data. The most significant task …

Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation

K Sethi, A Pradhan, P Bera - Journal of Information Security and …, 2020 - Elsevier
Multi-authority ciphertext policy attribute-based encryption (CP-ABE) is one of the promising
approaches where multiple authorities issue and manage various attributes to achieve fine …

A privacy-preserving attribute-based authenticated key management scheme for accountable vehicular communications

H Tan, W Zheng, Y Guan, R Lu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent years, the vehicular ad hoc network (VANET), recognized as the fundamental
infrastructure of the intelligent transportation system (ITS), has played an increasingly …