P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet. However, storing the data in the untrusted cloud server leads the privacy and access control …
S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The …
J Hur - IEEE transactions on knowledge and data engineering, 2011 - ieeexplore.ieee.org
With the recent adoption and diffusion of the data sharing paradigm in distributed systems such as online social networks or cloud computing, there have been increasing demands …
We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the …
Health care is a significant application of pervasive computing. In recent years, the pervasive health care applications are replaced by cloud-based health care applications thus solving …
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to provide a variety of on-demand data services via the edge network. Many cryptographic …
CC Lee, PS Chung, MS Hwang - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
Abstract In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been …
S Xu, J Ning, X Huang, J Zhou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As a versatile technique, cloud-fog computing extends the traditional cloud server to offer various on-demand data services. Maintaining data confidentiality is one of the most crucial …