A survey on attribute-based encryption schemes suitable for the internet of things

M Rasori, M La Manna, P Perazzo… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …

Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system

P Chinnasamy, P Deepalakshmi, AK Dutta, J You… - Mathematics, 2021 - mdpi.com
People can store their data on servers in cloud computing and allow public users to access
data via data centers. One of the most difficult tasks is to provide security for the access …

Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts

V Odelu, AK Das, MK Khan, KKR Choo, M Jo - IEEE Access, 2017 - ieeexplore.ieee.org
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications
for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment

V Odelu, AK Das, YS Rao, S Kumari, MK Khan… - Computer Standards & …, 2017 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) scheme can be deployed in a mobile
cloud environment to ensure that data outsourced to the cloud will be protected from …

Efficient traceable authorization search system for secure cloud storage

Y Yang, X Liu, X Zheng, C Rong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Secure search over encrypted remote data is crucial in cloud computing to guarantee the
data privacy and usability. To prevent unauthorized data usage, fine-grained access control …

RMA-CPABE: A multi-authority CPABE scheme with reduced ciphertext size for IoT devices

CK Chaudhary, R Sarma, FA Barbhuiya - Future Generation Computer …, 2023 - Elsevier
Abstract Internet of Things (IoT) generates a massive amount of data, which can be prone to
huge data and privacy leaks unless given a proper access control. Ciphertext-policy attribute …

Design of a new CP‐ABE with constant‐size secret keys for lightweight devices using elliptic curve cryptography

V Odelu, AK Das - Security and Communication Networks, 2016 - Wiley Online Library
The energy cost of public‐key cryptography is a vital component of modern secure
communications. It inhibits the widespread adoption within the ultra‐low energy regimes (for …

Efficient escrow-free CP-ABE with constant size ciphertext and secret key for big data storage in cloud

PK Premkamal, SK Pasupuleti… - International Journal of …, 2020 - igi-global.com
Ciphertext-policy attribute-based encryption (CP-ABE) schemes are an appropriate
cryptographic technique to enable privacy along with access control in the cloud, but the …

Secured sharing of data in cloud via dual authentication, dynamic unidirectional PRE, and CPABE

N Agarwal, A Rana, JP Pandey… - International Journal of …, 2020 - igi-global.com
Cloud computing is an emergent computing paradigm; however, data security is a significant
issue in recent time while outsourcing the data to the cloud preventing users to upload their …

Achieving adaptively secure data access control with privacy protection for lightweight IoT devices

Z Guan, W Yang, L Zhu, L Wu, R Wang - Science China Information …, 2021 - Springer
Abstract The Internet of things (IoT) technology has been used in a wide range of fields,
ranging from industrial manufacturing to daily lives. The IoT system contains numerous …