2020
DOI: 10.1177/1550147720906796
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing

Abstract: Wireless body area network includes some tiny wearable sensors for monitoring the physiological data of user, which has been a promising method of promoting the quality and efficiency greatly in healthcare. The collected physical signs are aggregated into the medical documents and uploaded to cloud server for utilizing by the remote user. As these files are highly sensitive privacy data, there is a vital challenge that constructs a secure and efficient communication architecture in this application scenario. B… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 21 publications
(30 citation statements)
references
References 42 publications
(66 reference statements)
0
30
0
Order By: Relevance
“…These services will help to establish secure communication channels among these components even if they belong to different security domains. Provide fundamental security mechanisms required by the virtualization infrastructure, such as which virtualization services to use, control which resources they can access, and so on. Monitor the status of infrastructure using situational awareness mechanisms. Fog computing must provide privacy services for both IoT devices and the service providers since they are part of the Fog environment. Fog should have digital evidence management (Forensics). Blockchain technology can be highly helpful in the Fog since it enables transparent and verifiable evidence and enhances trust and data sharing decisions. Recently, a tremendous number of publications claim that blockchain can mitigate the impact of many of the above privacy and security challenges (eg, 50,73,76,80‐86 ). Their findings will be included in the following discussion.…”
Section: Rq3—challenges and Future Directionsmentioning
confidence: 99%
See 4 more Smart Citations
“…These services will help to establish secure communication channels among these components even if they belong to different security domains. Provide fundamental security mechanisms required by the virtualization infrastructure, such as which virtualization services to use, control which resources they can access, and so on. Monitor the status of infrastructure using situational awareness mechanisms. Fog computing must provide privacy services for both IoT devices and the service providers since they are part of the Fog environment. Fog should have digital evidence management (Forensics). Blockchain technology can be highly helpful in the Fog since it enables transparent and verifiable evidence and enhances trust and data sharing decisions. Recently, a tremendous number of publications claim that blockchain can mitigate the impact of many of the above privacy and security challenges (eg, 50,73,76,80‐86 ). Their findings will be included in the following discussion.…”
Section: Rq3—challenges and Future Directionsmentioning
confidence: 99%
“…It requires further attention to proposing new mechanisms and authentication solutions 8,69 . Authors have provided many recommendations to enable effective authentication in the Fog environment such as the deployment of advanced cryptographic mechanisms, cooperative and lightweight authentication, key agreement protocols, and blockchain technology 29,65,69,76,81,85,89‐96 …”
Section: Rq3—challenges and Future Directionsmentioning
confidence: 99%
See 3 more Smart Citations