2018
DOI: 10.1016/j.future.2016.12.015
|View full text |Cite
|
Sign up to set email alerts
|

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
114
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 142 publications
(117 citation statements)
references
References 11 publications
1
114
0
Order By: Relevance
“…Due to limited resources of end devices, the schemes bring huge computing cost to user devices with the increase of attributes. By taking advantage of fog node's computing power, Zhang et al [84] proposed an improved CP-ABE-based access control scheme, which ensures data confidentiality. This work offloads the generation of access control structure in encryption phase and bilinear pairing operations in decryption phase to fog nodes to reduce the computational burden of user equipment.…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
“…Due to limited resources of end devices, the schemes bring huge computing cost to user devices with the increase of attributes. By taking advantage of fog node's computing power, Zhang et al [84] proposed an improved CP-ABE-based access control scheme, which ensures data confidentiality. This work offloads the generation of access control structure in encryption phase and bilinear pairing operations in decryption phase to fog nodes to reduce the computational burden of user equipment.…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
“…Recently, the application of IoT in the industrial domain is gaining momentum. In this direction, the operation of complex industrial physical machinery is integrated with networked sensors and software applications for enabling "Industrial Internet" based on IoTs [20] [21]. Furthermore, the Industrial Internet Consortium has been founded in March 2014 by AT&T, CISCO, General Electric, Intel, and IBM.…”
Section: Industrial Internet Of Thingsmentioning
confidence: 99%
“…In order to reduce the computational overheads, Liu et al [21] proposed an outsourced healthcare record access control system by moving the encryption computation offline and keeping online computation task very low. Yeh et al [22] proposed a decryption outsourcing framework for health information access control in the cloud by utilizing CSP to check whether the attributes satisfy the access policy in ciphertext, which induces the outsourced encryption and decryption scheme introduced by Zhang et al [23]. Intelligent healthcare, which is one of the intelligent services in the smart city, contains various health-related applications in MHSN, such as home care and emergency alarm [24].…”
Section: Related Workmentioning
confidence: 99%
“…The sharing data in our scheme is encrypted with CP-ABE and IBBE techniques, which are secure against chosen plaintext attack since the DBDH assumption holds [23,28]. We analyze the security properties of our scheme as follows [29].…”
Section: Security Analysismentioning
confidence: 99%