J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems a very challenging task. More so when access and storage are performed through a cloud …
J Bader, AL Michala - Wireless Communications and Mobile …, 2021 - hindawi.com
The technological advancements in the Internet of Things (IoT) and related technologies lead to revolutionary advancements in many sectors. One of these sectors, is the industrial …
Q Li, B Xia, H Huang, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile healthcare (mHealth) enables people to collect and share their personal health records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …
Y Zhang, C Xu, N Cheng, H Li, H Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose Chronos+, an accurate blockchain-based time-stamping scheme for outsourced data, where both the storage and time-stamping services are provided by cloud service …
Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022 - Elsevier
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE). The key generator center issues all users' secret keys and can decrypt each ciphertext by …
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest …
H Deng, Z Qin, Q Wu, Z Guan, Y Zhou - Information Sciences, 2020 - Elsevier
An increasing number of people are sharing their data through third-party platforms. Attribute- based encryption (ABE) is a promising primitive that allows enforcing fine-grained access …
People can store their data on servers in cloud computing and allow public users to access data via data centers. One of the most difficult tasks is to provide security for the access …