R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology resources are provided to end users following their request. With this technology, users and …
S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The …
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption …
Attribute-based encryption (ABE) is one of critical primitives for the application of fine- grained access control. To reduce the trust assumption on the attribute authority and in the …
Y Miao, J Ma, X Liu, X Li, Q Jiang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal …
In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme. We base on the direct revocation approach, by embedding the …
J Li, L Zhang, JK Liu, H Qian… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Cloud storage provides tremendous storage resources for both individual and enterprise users. In a cloud storage system, the data owned by a user are no longer possessed locally …
N Deepa, P Pandiaraja - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
File storing and retrieving is performed in the robust as well as secure manner by using the cloud computing technology. Various researchers have developed numerous mechanisms …
With the ever-increasing rate of adoption of internet-enabled smart devices, the allure of greater integration of technologies, such as smart home, smart city, and smart grid into …