2018
DOI: 10.1016/j.future.2016.10.028
|View full text |Cite
|
Sign up to set email alerts
|

CCA-secure ABE with outsourced decryption for fog computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
99
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 134 publications
(105 citation statements)
references
References 16 publications
0
99
0
3
Order By: Relevance
“…The fog computing was suggested by Cisco in 2012 . It is a solution to deal with internet‐connected equipment.…”
Section: Preliminary Conceptsmentioning
confidence: 99%
See 1 more Smart Citation
“…The fog computing was suggested by Cisco in 2012 . It is a solution to deal with internet‐connected equipment.…”
Section: Preliminary Conceptsmentioning
confidence: 99%
“…The fog computing was suggested by Cisco in 2012. 11 It is a solution to deal with internet-connected equipment. In fog computing, the cloud expands to be near to the things that generate and act on the internet of things (IoT).…”
Section: Task Scheduling In Fog Computingmentioning
confidence: 99%
“…A decoy IT approach has been proposed [60] to withstand malware insiders by masquerade signals to avert threatening of sensitive information. Zuo et al [61] suggested a ciphertext attack system in fog computing that presents a solution primarily to present the security model. A security model [22] also has been presented with reviewing possibility and nature of attacks.…”
Section: Security In Fogmentioning
confidence: 99%
“…Huang et al [14] proposed a CP-ABE scheme to support data security and fine-grained data access control, using features such as ciphertext updating and computation outsourcing for fog computing with IoT devices. As Zuo et al [28] also found, their scheme's main problem is that it was only suitable with an AND-gate encryption predicate. Xiao et al [25] proposed a hybrid fine-grained search and access authorization scheme for fog computing, based on a CP-ABE cryptographic primitive.…”
Section: A Access Controlmentioning
confidence: 99%