Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and supports fine-grained access control over encrypted data in the cloud. However, prior CP …
R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022 - Elsevier
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE). The key generator center issues all users' secret keys and can decrypt each ciphertext by …
Searchable Encryption (SE) is an important technique to guarantee data security and usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
K Zhang, J Long, X Wang, HN Dai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …
Y Miao, J Ma, X Liu, X Li, Z Liu… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Cloud-based mobile crowd-sourcing has been an attractive solution to provide data storage and share services for resource-limited mobile devices in a privacy-preserving manner, but …
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving data confidentiality securely. Many SE solutions have been designed to improve efficiency …
File storing as well as retrieving is the most important security-related research area in cloud. Based on our literature survey, many researchers have developed several …
Y Yang, X Zheng, W Guo, X Liu, V Chang - Future Generation Computer …, 2018 - Elsevier
In this paper, we propose a privacy-preserving e-health system, which is a fusion of Internet- of-things (IoT), big data and cloud storage. The medical IoT network monitors patient's …
X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng - Information Sciences, 2019 - Elsevier
Public-key encryption with keyword search (PEKS) enables users to search over encrypted data and retrieve target data efficiently. However, most of existing PEKS schemes are …