Results 1 to 10 of about 696,470 (284)
A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
doaj +3 more sources
A distributed authentication and authorization scheme for in-network big data sharing
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in
Ruidong Li +3 more
doaj +1 more source
Enhanced cloud storage access control scheme based on attribute
In order to ensure the security of data and privacy in cloud storage, an enhanced cloud storage access control solution based on attribute was proposed.
De-hua NIU +4 more
doaj +2 more sources
ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan +3 more
core
Secure and efficient data transmission is crucial for maintaining seamless system operations and user trust in the rapidly evolving Internet of Things (IoT) environments. However, IoT networks consistently suffer from data integrity breaches, security vulnerabilities at various network layers, and a high computational cost. Bridging the gap between IoT
Sugitha, G. +3 more
openaire +3 more sources
On-demand key management based on social attribute for opportunistic networks
An on-demand key management scheme was proposed based on social attributes,which could conform to the characteristics of intermittent connectivity,high mobility and self-organized management in opportunistic networks.By utilizing the identity-based ...
Xi CHEN +3 more
doaj +2 more sources
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates ...
Liaojun Pang, Jie Yang, Zhengtao Jiang
doaj +1 more source
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing
Compared with traditional wireless sensor networks, mobile crowdsensing networks have advantages of low cost, easy maintenance, and high scalability, which will play a role in city-level data sensing scenarios in the future.
Yuan Tian +4 more
doaj +1 more source
The Methods and Mechanisms for Access Control of Encrypted Data in Clouds
The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation
Sergey Vladimirovich Zapechnikov
doaj
Lattice-based ABE with multi-ciphertext equality test in cloud computing
Data is typically encrypted before transmission to a cloud server to safeguard user privacy. However, such encryption prevents the server from performing searches on the data, necessitating the introduction of novel cryptographic primitives, such as ...
Mengdi Zhao +3 more
doaj +1 more source

