Filters








308 Hits in 4.5 sec

Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things

Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu
2020 IEEE Access  
INDEX TERMS Internet of Things, cloud computing, fine-grained access control, attribute-based encryption, light weight computation.  ...  In this paper, to address these issues, we propose a lightweight revocable hierarchical ABE (LW-RHABE) scheme.  ...  CONCLUSION We designed a revocable lightweight hierarchical attributebased encryption scheme for IoT networks.  ... 
doi:10.1109/access.2020.2969957 fatcat:xhzijvrl6rhnzkqjpupokq43ym

A Review on Access Control Policy and Key Generation in Data Sharing

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant
2019 International Journal of Advanced Engineering Research and Science  
It consist four different attribute based encryption schemes such as KP-ABE (Key-policy attribute-based encryption), CP-ABE (ciphertext-policy attribute-based encryption), HABE (Hierarchical Attribute  ...  Efficient Policy-Hiding Attribute-Based Access Control: With the rapid development of the Internet of Things (IoT) and cloud computing technologies, smart health (shealth)is expected to significantly improve  ... 
doi:10.22161/ijaers.6.2.6 fatcat:jghs5et6lbhxxjgd7e2c2d2cve

Lightweight security framework for IoTs using identity based cryptography

Sriram Sankaran
2016 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)  
Internet of Things (IoTs) is gaining increasing significance due to real-time communication and decision making capabilities of sensors integrated into everyday objects.  ...  In particular, we develop a hierarchical security architecture for IoTs and further develop protocols for secure communication in IoTs using identity based cryptography.  ...  INTRODUCTION Advances in sensing, computing and communication have changed the Internet for people to Internet of things.  ... 
doi:10.1109/icacci.2016.7732156 dblp:conf/icacci/Sankaran16 fatcat:dpyyc5t7q5gi7bvezt6j55pkuy

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption  ...  In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  hierarchical attribute-based encryption (HABE, Fig. 13 ) and hierarchical attribute-set-based encryption (HASBE) and so on [72] . 1) HIERARCHICAL IDENTITY-BASED ENCRYPTION (HIBE) Identity-based encryption  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

Security and Privacy in the Medical Internet of Things: A Review

Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang
2018 Security and Communication Networks  
Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up.  ...  Instead of going to the hospital for help, patients' health-related parameters can be monitored remotely, continuously, and in real time, then processed, and transferred to medical data center, such as  ...  Acknowledgments The authors would like to acknowledge the financial support from the National Natural Science Foundation of China (no. 61379145) and the Joint Funds of CETC (Grant no. 20166141B08020101  ... 
doi:10.1155/2018/5978636 fatcat:odfuofjixnf25cdi7haxinhyny

A Lightweight Hybrid Key Management Scheme using Third Party Auditor for Data Security in Cloud

Vasanthi ., Dr. Chidambaram
2017 International Journal of Engineering and Technology  
The Attribute-based Encryption (ABE) [9-13] scheme accepts an extensive key related to a set of attributes relevant to the data owner and cloud user.  ...  In Double-layer Derivation Encryption [6-8] schemes, the number of cryptographic keys used for the data encryption process is double than the Single-layer encryption scheme.  ...  [35] presented a security model for Internet of Things (IOT) and proposed an access control method and an authorization update method to reduce the key management cost.  ... 
doi:10.21817/ijet/2017/v9i5/170905114 fatcat:z2pgp3c66fagxcqlo4if5rnccm

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world's digital economy are at the top of the tide.  ...  Thirdly, data encryption technologies and protection methods are summarized. Finally, we discuss several open research topics of data security for cloud storage.  ...  [56] proposed a hierarchical attribute-based encryption scheme, which can continuously resilient the leakage of master key and private key.  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities

Shancang Li, Kim-Kwang Raymond Choo, Zhiyuan Tan, Xiangjian He, Jiankun Hu, Tao Qin
2020 IEEE Access  
In the article titled ''Revocable identity-based encryption scheme under LWE assumption in the standard model,'' Zhang et al. proposed a revocable identity-based encryption scheme under learning with error  ...  His current research interests include digital forensics for emerging technologies, cybersecurity, IoT security, data privacy-preserving, the Internet of Things, blockchain technology, and lightweight  ... 
doi:10.1109/access.2020.3014416 fatcat:xrp4vsg6g5gyvohxtbvpzdpfm4

ABE-Cities: An Attribute-Based Encryption System for Smart Cities

Marco Rasori, Pericle Perazzo, Gianluca Dini
2018 2018 IEEE International Conference on Smart Computing (SMARTCOMP)  
In this work we present ABE-Cities, an encryption scheme for urban sensing which solves the above problems while ensuring fine-grained access control on data by means of Attribute-Based Encryption (ABE  ...  In the near future, a technological revolution will involve our cities, where a variety of smart services based on the Internet of Things will be developed to facilitate the needs of the citizens.  ...  In this paper we present ABE-Cities, an encryption system for urban sensing in a smart city based on Attribute-Based Encryption.  ... 
doi:10.1109/smartcomp.2018.00075 dblp:conf/smartcomp/RasoriPD18 fatcat:km3meysonbcabjwx6h42i55myy

Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption

Al-Dahhan, Shi, Lee, Kifayat
2019 Sensors  
data according to attributes, particularly for Internet of Things (IoT)applications.  ...  In particular, Ciphertext‐Policy AttributeBased Encryption (CP‐ABE) is a promising,advanced type of encryption technique that resolves an open challenge to regulate fine‐grainedaccess control of sensitive  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19071695 fatcat:ebu4reenvbcsflttzyr26o2jw4

Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage

Qiuyu Zhang, Zhenyu Zhao, Minrui Fu, Luigi Coppolino
2021 Security and Communication Networks  
a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed.  ...  First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure.  ...  Acknowledgments is work was supported by the National Natural Science Foundation of China (grant nos. 61862041 and 61363078).  ... 
doi:10.1155/2021/9606240 fatcat:hx7dc6ek2ncctgiw67zorq6yra

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
2019 Transactions on Emerging Telecommunications Technologies  
Recent technological advances such as the Internet of Things (IoT), fog computing, cloud applications lead to exponential growth in the amount of generated data.  ...  Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers.  ...  Kaaniche et al. 74 have introduced an encryption scheme based on attribute based mechanisms for multi-level access policies.  ... 
doi:10.1002/ett.3667 fatcat:eu7rs5halbefrmbiipbf6t7c7e

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT [article]

Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
2020 arXiv   pre-print
As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance.  ...  This paper proposes JEDI (Joining Encryption and Delegation for IoT), a many-to-many end-to-end encryption protocol for IoT.  ...  We would also like to thank students from the RISE Security Group and BETS Research Group for giving us feedback on early drafts of this paper.  ... 
arXiv:1905.13369v2 fatcat:ztf2h7zw5vgglgcr3an7px64b4

Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things

Qikun Zhang, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan, Xiangyang Luo
2019 Sensors  
The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users.  ...  Access control is an important issue to ensure the trust of the Internet of Things.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19235237 pmid:31795236 pmcid:PMC6928987 fatcat:ax5i7oybwrcy7pdhbbcoek2ymy

Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems

Qian He, Ning Zhang, Yongzhuang Wei, Yan Zhang
2018 Computer Networks  
In this paper, we propose a Lightweight Attribute Based Encryption Scheme (LABE) for mobile cloud-assisted CPS based on a proxy service architecture and a new ciphertext policy ABE.  ...  The tradition Attribute Based Encryption (ABE) is known for its high computation load which creates a significant challenge for resource constrained mobile devices.  ...  In this paper, we mainly focus on our proposed Lightweight Attribute Based Encryption Scheme (LABE) for mobile cloud assisted CPS.  ... 
doi:10.1016/j.comnet.2018.01.038 fatcat:n4qmuap6vncnzcqxmi3xe4c5cu
« Previous Showing results 1 — 15 out of 308 results