A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions

P Sun, Y Wan, Z Wu, Z Fang, Q Li - Computers & Security, 2025 - Elsevier
With the continuous development of information technology, privacy protection in the Internet
of Things (IoT) has attracted people's attention. This paper summarizes and discusses the …

Str-abks: Server-aided traceable and revocable attribute-based encryption with keyword search

F Meng, L Cheng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Attribute-based encryption with keyword search (ABKS) is a powerful cryptographic primitive
achieving search functionality and access control for the encrypted data outsourced to the …

Towards Fine-Grained and Forward-Secure Access Control in Cloud-Assisted IoT

H Deng, H Yin, Z Qin, L Ou, F Li… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With an increasing amount of data produced by pervasive and ubiquitous smart devices,
many Internet of Things (IoT) applications adopt the cloud platform to store and process …

A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT

A Peñuelas-Angulo, C Feregrino-Uribe… - Journal of Systems …, 2024 - Elsevier
As more applications move data storage to the cloud, protecting sensitive data becomes
increasingly important, especially for the Internet of Things (IoT) environments. Ciphertext …

RRMAC: A Multi-data Owner Access Control Scheme with Robust Revocation for Co-owned Data Sharing

B Li, H Zhong, J Cui, C Gu, D He - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Due to the rising requirement for data sharing, multi-data owner access control schemes
have emerged, where a single data file is jointly owned by multiple data owners. Since the …

Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet

J Feng, J Zhang, W Zhang, G Han - Journal of Information Security and …, 2024 - Elsevier
Encryption technology provides the ability of confidential transmission to ensure the security
of Industrial Internet communication, but it makes detecting malicious encrypted traffic very …

A Unified Attribute-Based Encryption Data Sharing Scheme Matching Industrial Internet Framework

Z Wang, Y Fu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The Industrial Internet is the combination of traditional industry and Internet technology to
achieve intelligent, automated, information-based, and networked production modes. From …

Verifiable Keyword Search Encryption Scheme That Supports Revocation of Attributes

T Feng, S Miao, C Liu, R Ma - Symmetry, 2023 - mdpi.com
In recent years, searchable encryption technology and attribute encryption technology have
been widely used in cloud storage environments, and attribute-based searchable encryption …

A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing

J Cai, H Zhang, Z Duo, X Wang, X Zhao - IEEE Access, 2024 - ieeexplore.ieee.org
Relying on the low latency, high reliability, and large bandwidth of 5G networks, the Internet
of Things (IoT) can more efficiently promote information interaction and data utilization …

A Public Key Searchable Encryption Method Based on Multiple Keywords

W Ji, Y Wang, X Luo, L Li, G Xu… - Journal of Electronics and …, 2023 - clausiuspress.com
In recent years, the secure search of encrypted cloud data has become a hot research topic
and a challenging task. Several secure search schemes have been proposed to address …