Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J Xia… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

[HTML][HTML] Searchable encryption with access control in industrial internet of things (IIoT)

J Bader, AL Michala - Wireless Communications and Mobile …, 2021 - hindawi.com
The technological advancements in the Internet of Things (IoT) and related technologies
lead to revolutionary advancements in many sectors. One of these sectors, is the industrial …

TRAC: traceable and revocable access control scheme for mHealth in 5G-enabled IIoT

Q Li, B Xia, H Huang, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile healthcare (mHealth) enables people to collect and share their personal health
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …

Chronos: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage

Y Zhang, C Xu, N Cheng, H Li, H Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose Chronos+, an accurate blockchain-based time-stamping scheme for outsourced
data, where both the storage and time-stamping services are provided by cloud service …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

Key escrow-free attribute based encryption with user revocation

R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022 - Elsevier
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE).
The key generator center issues all users' secret keys and can decrypt each ciphertext by …

A Survey on Searchable Symmetric Encryption

F Li, J Ma, Y Miao, X Liu, J Ning, RH Deng - ACM Computing Surveys, 2023 - dl.acm.org
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …

Flexible attribute-based proxy re-encryption for efficient data sharing

H Deng, Z Qin, Q Wu, Z Guan, Y Zhou - Information Sciences, 2020 - Elsevier
An increasing number of people are sharing their data through third-party platforms. Attribute-
based encryption (ABE) is a promising primitive that allows enforcing fine-grained access …

Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system

P Chinnasamy, P Deepalakshmi, AK Dutta, J You… - Mathematics, 2021 - mdpi.com
People can store their data on servers in cloud computing and allow public users to access
data via data centers. One of the most difficult tasks is to provide security for the access …