A practical fog-based privacy-preserving online car-hailing service system

J Sun, G Xu, T Zhang, M Alazab… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Aiming for minimizing passengers' waiting time and vehicles' vacancy rate, online car-
hailing service systems with fog computing has been deployed in various scenarios. In this …

AESM2 Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems

M Wang, Y Miao, Y Guo, H Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the rapid development of cloud computing, it is popular for data owners to outsource
massive data to the cloud server for data sharing. To protect the privacy of sensitive data …

Secure Internet of Things in cloud computing via puncturable attribute-based encryption with user revocation

H Cui, X Yi - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With significant achievements of Internet of Things (IoT) in cloud services, IoT devices are
becoming primary targets of cyber attackers. To protect security of previous messages …

Expressive data sharing and self-controlled fine-grained data deletion in cloud-assisted IoT

Q Mei, M Yang, J Chen, L Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Expressive data sharing and efficient data deletion are essential to drive the development of
cloud-assisted IoT. But insecure transmission and the vulnerability of the cloud server may …

Softwarized IoT network immunity against eavesdropping with programmable data planes

G Liu, W Quan, N Cheng, D Gao, N Lu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
State-of-the-art mechanisms against eavesdropping first encrypt all packet payloads in the
application layer and then split the packets into multiple network paths. However, versatile …

Securing fine-grained data sharing and erasure in outsourced storage systems

J Wei, X Chen, J Wang, X Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The wide use of internet-connected services makes massive personal data collected by
service providers without the need of our consent. Although the archived data may enable …

Burn after reading: Adaptively secure puncturable identity-based proxy re-encryption scheme for securing group message

H Xiong, L Wang, Z Zhou, Z Zhao… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Puncturable proxy re-encryption (PPRE) is envisioned to provide secure access control
delegation and fine-grained forward security for asynchronous group messaging systems …

Puncturable key-policy attribute-based encryption scheme for efficient user revocation

D Ghopur, J Ma, X Ma, J Hao, T Jiang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud computing, which provides a brand-new service model, has become an important
infrastructure in the information age, and has been widely used in numerous fields. The Key …

Efficient unbounded fully attribute hiding inner product encryption in cloud-aided WBANs

H Xiong, M Yang, T Yao, J Chen… - IEEE Systems …, 2021 - ieeexplore.ieee.org
By integrating cloud computing and traditional wireless body area networks (WBANs), the
emerging cloud-aided WBANs for smart health care have been significantly developed in …

Puncturable Attribute-Based Encryption from Lattices for Classified Document Sharing

M Yang, H Wang, D He - IEEE Transactions on Information …, 2024 - ieeexplore.ieee.org
The country's governmental agencies bear the responsibility for overseeing and executing a
wide range of national policies and initiatives, formulating pivotal determinations aimed at …