People can store their data on servers in cloud computing and allow public users to access data via data centers. One of the most difficult tasks is to provide security for the access …
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …
Ciphertext-policy attribute-based encryption (CP-ABE) scheme can be deployed in a mobile cloud environment to ensure that data outsourced to the cloud will be protected from …
Y Yang, X Liu, X Zheng, C Rong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Secure search over encrypted remote data is crucial in cloud computing to guarantee the data privacy and usability. To prevent unauthorized data usage, fine-grained access control …
CK Chaudhary, R Sarma, FA Barbhuiya - Future Generation Computer …, 2023 - Elsevier
Abstract Internet of Things (IoT) generates a massive amount of data, which can be prone to huge data and privacy leaks unless given a proper access control. Ciphertext-policy attribute …
V Odelu, AK Das - Security and Communication Networks, 2016 - Wiley Online Library
The energy cost of public‐key cryptography is a vital component of modern secure communications. It inhibits the widespread adoption within the ultra‐low energy regimes (for …
Ciphertext-policy attribute-based encryption (CP-ABE) schemes are an appropriate cryptographic technique to enable privacy along with access control in the cloud, but the …
Cloud computing is an emergent computing paradigm; however, data security is a significant issue in recent time while outsourcing the data to the cloud preventing users to upload their …
Abstract The Internet of things (IoT) technology has been used in a wide range of fields, ranging from industrial manufacturing to daily lives. The IoT system contains numerous …