Results 31 to 40 of about 4,231 (188)

Fine-grained attribute update and outsourcing computing access control scheme in fog computing

open access: yesTongxin xuebao, 2021
To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute ...
Ruizhong DU, Peiwen YAN, Yan LIU
doaj   +2 more sources

Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things

open access: yesIEEE Access, 2017
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can provide computation and storage services to end devices in Internet of Things (IoT).
Qinlong Huang, Yixian Yang, Licheng Wang
doaj   +1 more source

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation [PDF]

open access: yes, 2017
This is a copy of the author 's final draft version of an article published in the "Journal of ambient intelligence and humanized computing". The final publication is available at Springer via http://dx.doi.org/10.1007/s12652-017-0658-2In this paper two ...
An Wang, Xu   +4 more
core   +2 more sources

A Fully Outsourced Attribute-Based Signcryption Scheme Supporting Privacy-Preserving Policy Update in Mobile Cloud Computing

open access: yesIEEE Access, 2023
Existing fine-grained and secure access control systems deployed in mobile cloud computing (MCC) typically focus on offloading encryption and/or decryption workloads to the delegated proxy in the cloud server.
Pattavee Sanchol, Somchart Fugkeaw
doaj   +1 more source

Distributed Attribute-Based Encryption Scheme Based on Fog Nodes [PDF]

open access: yesJisuanji gongcheng, 2021
The existing cloud storage schemes have multiple limitations, including the general division of user rights to access data, fine-grained control access permissions, and single point of failure in single authority.This paper proposes a distributed ...
MA Jiajia, ZHANG Zhiqiang, CAO Suzhen, DOU Fengge, DING Xiaohui, WANG Caifen
doaj   +1 more source

SAFIUS - A secure and accountable filesystem over untrusted storage [PDF]

open access: yes, 2007
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention from rollback attacks, and accountability.
Gopinath, K, Narayan, Ganesh, Sriram, V
core   +2 more sources

Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing [PDF]

open access: yesJisuanji gongcheng, 2020
Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data ...
HUANG Fengming, TU Shanshan, MENG Yuan
doaj   +1 more source

A privacy-preserving fuzzy interest matching protocol for friends finding in social networks [PDF]

open access: yes, 2017
Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ever before.
Ding, Yong   +4 more
core   +2 more sources

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

A secure data outsourcing scheme based on Asmuth – Bloom secret sharing [PDF]

open access: yes, 2015
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service ...
Habbal, Adib   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy