2016
DOI: 10.1109/tifs.2016.2523941
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
133
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 241 publications
(133 citation statements)
references
References 35 publications
0
133
0
Order By: Relevance
“…Thus, equally coded text or data storage plus time price of coded data form are accumulated. Furthermore, this method is shown to be safe below the typical theory [8].…”
Section: Introductionmentioning
confidence: 93%
“…Thus, equally coded text or data storage plus time price of coded data form are accumulated. Furthermore, this method is shown to be safe below the typical theory [8].…”
Section: Introductionmentioning
confidence: 93%
“…Several research concepts, such as fog computing, cloudlets, mobile edge computing and IoT-centric clouds have been recently proposed to complement the distributed cloud architectures for IoT data analysis and security [145,146,147,148]. Fog computing has the potential to increase the overall performance of IoT applications as it tries to perform part of high level services, which are offered by the cloud, inside local resources.…”
Section: Building Iot For Tactical and Emergency Environmentsmentioning
confidence: 99%
“…An efficient file hierarchy attribute-based encryption scheme(FH-CP-ABE) is proposed by Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, Jianyong Chen and Weixin Xie [2]. The layered access structures are integrated into a single access structure, and then the hierarchical files are encrypted with the integrated access structure.…”
Section: B File Hierarchy Attribute-based Schemementioning
confidence: 99%