Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

A survey on attribute-based encryption schemes suitable for the internet of things

M Rasori, M La Manna, P Perazzo… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …

A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems

S Wang, Y Zhang, Y Zhang - Ieee Access, 2018 - ieeexplore.ieee.org
In traditional cloud storage systems, attribute-based encryption (ABE) is regarded as an
important technology for solving the problem of data privacy and fine-grained access control …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

A secure and verifiable data sharing scheme based on blockchain in vehicular social networks

K Fan, Q Pan, K Zhang, Y Bai, S Sun… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The vehicular social networks (VSNs) supports diverse kinds of services such as traffic
management, road safety, and sharing data (videos, audios, roads photos, air quality, and …

Key escrow-free attribute based encryption with user revocation

R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022 - Elsevier
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE).
The key generator center issues all users' secret keys and can decrypt each ciphertext by …

Privacy-preserving attribute-based keyword search in shared multi-owner setting

Y Miao, X Liu, KKR Choo, RH Deng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …

Efficient CP-ABE scheme with shared decryption in cloud storage

N Chen, J Li, Y Zhang, Y Guo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a preferred technology used to access control the data
stored in the cloud servers. However, in many cases, the authorized decryption user may be …

Efficient revocable attribute-based encryption with verifiable data integrity

S Chen, J Li, Y Zhang, J Han - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Nowadays, cloud computing and cloud storage services that can reduce the local workload
are becoming increasingly popular, allowing individual and corporate users to upload data …

Certificateless public integrity checking of group shared data on cloud storage

J Li, H Yan, Y Zhang - IEEE Transactions on Services …, 2018 - ieeexplore.ieee.org
Cloud storage service supplies people with an efficient method to share data within a group.
The cloud server is not trustworthy, so lots of remote data possession checking (RDPC) …