Medical data sharing scheme based on attribute cryptosystem and blockchain technology

X Yang, T Li, X Pei, L Wen, C Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Electronic medical data have significant advantages over paper-based patient records when
it comes to storage and retrieval. However, most existing medical data sharing schemes …

Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts

V Odelu, AK Das, MK Khan, KKR Choo, M Jo - IEEE Access, 2017 - ieeexplore.ieee.org
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications
for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …

Enhanced attribute based access control with secure deduplication for big data storage in cloud

PK Premkamal, SK Pasupuleti, AK Singh… - Peer-to-Peer Networking …, 2021 - Springer
The cloud storage is the best option to outsource big data, as the cloud has the capability of
storing a huge volume of data. However, cloud storage brings new concerns for privacy, fine …

A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud

PK Premkamal, SK Pasupuleti… - Journal of Ambient …, 2019 - Springer
The foremost security concerns for big data in the cloud are privacy and access control.
Ciphertext-policy attribute based encryption (CP-ABE) is an effective cryptographic solution …

[HTML][HTML] Blockchain-enabled decentralized attribute-based access control with policy hiding for smart healthcare

Y Zhang, X Wei, J Cao, J Ning, Z Ying… - Journal of King Saud …, 2022 - Elsevier
With the rapid development of edge computing technologies, smart healthcare significantly
improves people's lives by collecting and analyzing health data in real time. However …

Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks

A Gupta, SK Gupta - International journal of communication …, 2022 - Wiley Online Library
A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers
worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone …

A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

Analysis of attribute‐based cryptographic techniques and their application to protect cloud services

S Belguith, N Kaaniche… - Transactions on …, 2022 - Wiley Online Library
Recent technological advances such as the internet of things, fog computing, and cloud
applications lead to exponential growth in the amount of generated data. Indeed, cloud …

A secure and lightweight fine-grained data sharing scheme for mobile cloud computing

H Li, C Lan, X Fu, C Wang, F Li, H Guo - Sensors, 2020 - mdpi.com
With the explosion of various mobile devices and the tremendous advancement in cloud
computing technology, mobile devices have been seamlessly integrated with the premium …

Dynamic traceable CP‐ABE with revocation for outsourced big data in cloud storage

PK Premkamal, SK Pasupuleti… - International Journal of …, 2021 - Wiley Online Library
Ciphertext‐policy attribute‐based encryption (CP‐ABE) is the recommended best practice
for outsourced big data access control in the cloud environment. However, most of the …