Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

A survey on attribute-based encryption schemes suitable for the internet of things

M Rasori, M La Manna, P Perazzo… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …

Secure cloud-based EHR system using attribute-based cryptosystem and blockchain

H Wang, Y Song - Journal of medical systems, 2018 - Springer
To achieve confidentiality, authentication, integrity of medical data, and support fine-grained
access control, we propose a secure electronic health record (EHR) system based on …

Secure attribute-based data sharing for resource-limited users in cloud computing

J Li, Y Zhang, X Chen, Y Xiang - computers & security, 2018 - Elsevier
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …

An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things

J Zhang, Y Yang, X Liu, J Ma - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
With the assistance of the Internet of Things, the fast developing Healthcare Internet of
Things (H-IoT) has promoted the healthcare ecosystem into the era of Health 5.0 and …

Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems

T Zhang, J Shen, CF Lai, S Ji, Y Ren - Future Generation Computer …, 2023 - Elsevier
The integration of Metaverse and healthcare will improve the allocation and utilization of
healthcare resources. Metaverse healthcare data is stored on a public server and …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System

R Guo, G Yang, H Shi, Y Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the processes of collecting, analyzing, and transmitting the data in the Internet of Things
(IoT), the Internet of Medical Things (IoMT) comprises the medical equipment and …

Lightweight searchable encryption protocol for industrial internet of things

K Zhang, J Long, X Wang, HN Dai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …