Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
A Lightweight CP‐ABE Scheme for EHR Over Cloud Based on Blockchain and Secure Multi‐Party Computation
Transactions on Emerging Telecommunications Technologies (TETT), Volume 36, Issue 2https://doi.org/10.1002/ett.70053ABSTRACTWith the growth of cloud computing and the popularity of electronic health records (EHR), more and more patients and hospitals are uploading EHR to the cloud for storage, retrieval and organization. Due to the privacy of EHR, cloud‐based EHR ...
This article proposes a lightweight CP‐ABE scheme for EHR over cloud based on blockchain and secure multi‐party computation (LCBS). We design a blockchain suitable for EHR systems to record the users' key information, assisting multiple entities to verify ...
- short-paperDecember 2024
Multi-Client Searchable Encryption with Granular Access Control for Cloud-Assisted IoT
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1620–1622https://doi.org/10.1145/3636534.3697438Cloud-assisted Internet of Things (CIoT) enhances data accessibility and operational efficiency but encounters various security and privacy challenges. Today, CIoT applications generate large amounts of data in a multi-client accessible environment ...
- short-paperDecember 2024
Efficient and Secure Cloud Data Sharing Using CP-ABE Supporting Dynamic Attributes
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 2245–2247https://doi.org/10.1145/3636534.3695904Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a cryptographic primitive that provides confidentiality and fine-grained access control for data sharing in untrusted cloud environments. It allows data owners to set access policies based on ...
- ArticleFebruary 2025
Secure and Revocable Multi-authority CP-ABE for Mobile Cloud Computing
Algorithms and Architectures for Parallel ProcessingPages 75–84https://doi.org/10.1007/978-981-96-1528-5_5AbstractMobile cloud computing (MCC) enhances mobile device capabilities with cloud-based resources, allowing mobile users to outsource more data to the cloud to enjoy services of interest. It uses ciphertext policy attribute-based encryption (CP-ABE) to ...
- research-articleOctober 2024
Blockchain-based and multi-authority hierarchical access control data sharing scheme
Computers and Electrical Engineering (CENG), Volume 119, Issue PAhttps://doi.org/10.1016/j.compeleceng.2024.109547AbstractAs cloud computing technology advances, the demand for data sharing through cloud platforms is increasing. However, existing approaches suffer from limitations in granularity and flexibility. Ciphertext Policy Attribute-Based Encryption (CP-ABE) ...
Graphical abstractDisplay Omitted
Highlights- A hierarchical access control method based on blockchain and multiple authorities for CP-ABE is proposed.
- The utilization of blockchain technology ensures the secure and reliable documentation of the access control procedures.
- The ...
-
- research-articleDecember 2024
Research on Zero-Trust Dynamic Access Control Model Based on User Behavior in Internet of Things Environment
CISAI '24: Proceedings of the 2024 7th International Conference on Computer Information Science and Artificial IntelligencePages 402–407https://doi.org/10.1145/3703187.3703255In the IoT environment, traditional access control mechanisms suffer from overuse of user privileges and coarse access granularity, while failing to verify user requests in real time. To address these challenges, this paper introduces the User Behavior-...
- research-articleSeptember 2024
An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption
International Journal of Information Security (IJOIS), Volume 23, Issue 6Pages 3691–3710https://doi.org/10.1007/s10207-024-00906-zAbstractThe integration of the Internet of Things into patient monitoring devices has garnered significant attention, especially in response to the COVID-19 pandemic’s increased focus on telecare services. However, Internet of Medical Things (IoMT) ...
- research-articleSeptember 2024
End to End secure data exchange in value chains with dynamic policy updates
Future Generation Computer Systems (FGCS), Volume 158, Issue CPages 333–345https://doi.org/10.1016/j.future.2024.04.053AbstractData exchange among value chain partners offers a competitive advantage, but it also exposes sensitive data to increasing risks of compromise. To protect this data, securing it during storage and transmission is essential, allowing only the data ...
Highlights- Industrial data confidentiality is crucial to minimize damage from data breaches.
- Robust end-to-end confidentiality for industrial data with CP-ABE.
- Flexible and scalable access control with policy updates.
- The proposal is ...
- research-articleSeptember 2024
Load-balanced attribute-based outsourced encryption for constrained IoT devices
Computers and Electrical Engineering (CENG), Volume 118, Issue PBhttps://doi.org/10.1016/j.compeleceng.2024.109424AbstractThe Internet of Things (IoTs) is based on physical sensors that collect data and transfer it to remote cloud computing platforms for processing and storage. Healthcare applications are one of the very promising areas where IoTs are expected to ...
- research-articleSeptember 2024
Auditable and dynamic access control scheme with behavior and identity tracing
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 251, Issue Chttps://doi.org/10.1016/j.comnet.2024.110623AbstractCiphertext policy attribute-based encryption (CP-ABE) is a potential solution to security sharing issues since it offers one-to-many encryption and fine-grained access control. To prevent users from disclosing their access permissions, traceable ...
Highlights- An efficient tracking mechanism is designed for key-associated users based on white-box tracking to avoid the privilege abuse problem.
- An auditable contract based on blockchain is employed to prevent user denial.
- An authority ...
- ArticleAugust 2024
ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on Blockchain
AbstractElectronic Health Records (EHRs) play a crucial role in improving healthcare efficiency and quality through data sharing between healthcare institutions and patients. The sharing of EHRs necessitates collaboration, especially in emergency cases ...
- research-articleAugust 2024
SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1https://doi.org/10.1186/s13677-024-00692-yAbstractImplementing a cloud-based data warehouse to store sensitive or critical strategic data presents challenges primarily related to the security of the stored information and the exchange of OLAP queries between the cloud server and users. Although ...
- short-paperAugust 2024
Poster: Fine-Grained Access Control with Efficient Range Comparison for Outsourced Data
ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and DemosPages 72–74https://doi.org/10.1145/3672202.3673748Ciphertext-policy attribute-based encryption (CP-ABE) offers a promising approach to enforce fine-grained access control over outsourced data through cryptographic functions. It enables data owners to formulate access policies by specifying attribute ...
- ArticleNovember 2024
Traceable Health Data Sharing Based-on Blockchain
Wireless Artificial Intelligent Computing Systems and ApplicationsPages 196–208https://doi.org/10.1007/978-3-031-71464-1_17AbstractWith the advent of the digital age, the generation and storage of health data is growing exponentially. However, the effective sharing of health data has always been a problem of concern. Traditional health data sharing methods have many problems, ...
- research-articleMarch 2024
Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 36, Issue 3https://doi.org/10.1016/j.jksuci.2024.101969AbstractNowadays, the integration of blockchain technology with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has drawn the researcher attention because it can provide key security auditing and transaction traceability in the context of data ...
- research-articleJune 2024
Research on Controlled Access Technology of Power Data Based on Heavy Encryption Combined with CP-ABE
ICMLC '24: Proceedings of the 2024 16th International Conference on Machine Learning and ComputingPages 21–28https://doi.org/10.1145/3651671.3651713In order to prevent and control the risks of electricity bill collection fraud, money laundering and payment arrears, and improve the lean management level of customer service, in response to the difficulties in sharing large amounts of traditional ...
- research-articleOctober 2023
A metaverse-oriented CP-ABE scheme with cryptographic reverse firewall
Future Generation Computer Systems (FGCS), Volume 147, Issue CPages 195–206https://doi.org/10.1016/j.future.2023.04.025AbstractMetaverse is an immersive, hyperspace virtual reality space. Due to its characteristics of hyperspace and immersive realism, metaverse has a bright future, but ubiquitous user analysis and calculation make it difficult to achieve one-to-multiple ...
Highlights- We propose an outsourced CP-ABE scheme with cryptographic reverse firewall protection.
- We propose an black-box tracing CP-ABE scheme with cryptographic reverse firewall protection.
- The scheme is high efficient, resistant to ...
- research-articleSeptember 2023
Collusion resistant multi-authority access control scheme with privacy protection for personal health records
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 35, Issue 8https://doi.org/10.1016/j.jksuci.2023.101677AbstractThe personal health record (PHR) is an important part of the smart health system. The medical profession can provide medical services to patients in time by accessing PHRs stored in the cloud. However, PHR suffers from unauthorized access and ...
- ArticleNovember 2023
CVAR-FL IoV Intrusion Detection Framework
Information Security Practice and ExperiencePages 123–137https://doi.org/10.1007/978-981-99-7032-2_8AbstractWith the popularization of internet of vehicles (IoV) applications, security issues are becoming increasingly prominent. IoV is vulnerable to various attacks, which may endanger users’ privacy, functionality, property and even life. The security ...
- research-articleAugust 2023
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 12, Issue 1https://doi.org/10.1186/s13677-023-00486-8AbstractImplementing a trust and secure immunity or vaccine passport verification system is now crucial for many countries. The system typically aims to enable the secure access control and verification of vaccination records which will be used by trusted ...