A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain

KOBO Agyekum, Q Xia, EB Sifah… - IEEE Systems …, 2021 - ieeexplore.ieee.org
The evolution of the Internet of Things has seen data sharing as one of its most useful
applications in cloud computing. As eye-catching as this technology has been, data security …

Proxy re-encryption: Analysis of constructions and its application to secure access delegation

D Nuñez, I Agudo, J Lopez - Journal of Network and Computer Applications, 2017 - Elsevier
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.

A Alsirhani, M Ezz, AM Mostafa - Computer Systems Science & …, 2022 - cdn.techscience.cn
Identity management is based on the creation and management of user identities for
granting access to the cloud resources based on the user attributes. The cloud identity and …

[PDF][PDF] Cloud computing and security issues in the cloud

M Ahmed, MA Hossain - … Journal of Network Security & Its …, 2014 - wanivipin.wordpress.com
Cloud computing has formed the conceptual and infrastructural basis for tomorrow's
computing. The global computing infrastructure is rapidly moving towards cloud based …

Flexible attribute-based proxy re-encryption for efficient data sharing

H Deng, Z Qin, Q Wu, Z Guan, Y Zhou - Information Sciences, 2020 - Elsevier
An increasing number of people are sharing their data through third-party platforms. Attribute-
based encryption (ABE) is a promising primitive that allows enforcing fine-grained access …

Healing on the cloud: Secure cloud architecture for medical wireless sensor networks

A Lounis, A Hadjidj, A Bouabdallah, Y Challal - Future Generation …, 2016 - Elsevier
There has been a host of research works on wireless sensor networks (WSN) for medical
applications. However, the major shortcoming of these efforts is a lack of consideration of …

Ensuring accountability in digital forensics with proxy re-encryption based chain of custody

RY Patil, YH Patil, A Bannore, M Ranjanikar - International Journal of …, 2024 - Springer
In the realm of digital forensics, the establishment of robust standards for maintaining the
integrity of digital evidence is of paramount importance. Addressing this concern, this study …

An efficient hybrid QHCP-ABE model to improve cloud data integrity and confidentiality

KK Singamaneni, A Nauman, S Juneja, G Dhiman… - Electronics, 2022 - mdpi.com
Cloud computational service is one of the renowned services utilized by employees,
employers, and organizations collaboratively. It is accountable for data management and …

Cost-effective secure E-health cloud system using identity based cryptographic techniques

XA Wang, J Ma, F Xhafa, M Zhang, X Luo - Future Generation Computer …, 2017 - Elsevier
Nowadays E-health cloud systems are more and more widely employed. However the
security of these systems needs more consideration for the sensitive health information of …

Hybrid technique for cyber-physical security in cloud-based smart industries

D Garg, S Rani, N Herencsar, S Verma, M Wozniak… - Sensors, 2022 - mdpi.com
New technologies and trends in industries have opened up ways for distributed
establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely …