Results 31 to 40 of about 4,231 (188)
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute ...
Ruizhong DU, Peiwen YAN, Yan LIU
doaj +2 more sources
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can provide computation and storage services to end devices in Internet of Things (IoT).
Qinlong Huang, Yixian Yang, Licheng Wang
doaj +1 more source
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation [PDF]
This is a copy of the author 's final draft version of an article published in the "Journal of ambient intelligence and humanized computing". The final publication is available at Springer via http://dx.doi.org/10.1007/s12652-017-0658-2In this paper two ...
An Wang, Xu +4 more
core +2 more sources
Existing fine-grained and secure access control systems deployed in mobile cloud computing (MCC) typically focus on offloading encryption and/or decryption workloads to the delegated proxy in the cloud server.
Pattavee Sanchol, Somchart Fugkeaw
doaj +1 more source
Distributed Attribute-Based Encryption Scheme Based on Fog Nodes [PDF]
The existing cloud storage schemes have multiple limitations, including the general division of user rights to access data, fine-grained control access permissions, and single point of failure in single authority.This paper proposes a distributed ...
MA Jiajia, ZHANG Zhiqiang, CAO Suzhen, DOU Fengge, DING Xiaohui, WANG Caifen
doaj +1 more source
SAFIUS - A secure and accountable filesystem over untrusted storage [PDF]
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention from rollback attacks, and accountability.
Gopinath, K, Narayan, Ganesh, Sriram, V
core +2 more sources
Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing [PDF]
Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data ...
HUANG Fengming, TU Shanshan, MENG Yuan
doaj +1 more source
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks [PDF]
Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ever before.
Ding, Yong +4 more
core +2 more sources
On the feasibility of attribute-based encryption on Internet of Things devices [PDF]
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M +6 more
core +3 more sources
A secure data outsourcing scheme based on Asmuth – Bloom secret sharing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service ...
Habbal, Adib +4 more
core +1 more source

