2019
DOI: 10.1016/j.future.2019.04.003
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and privacy preserving access control scheme for fog-enabled IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(39 citation statements)
references
References 15 publications
0
39
0
Order By: Relevance
“…Integrating CP-ABE and searchable encryption, Miao et al 41 proposed an efficient fine-grained ciphertext searching system, which shifted partial computation overhead from the DU to the selected FN. Fan et al 42 introduced an access control scheme with multiple authorities for privacy preservation in the fog-assisted IoT architecture, which operated the verifiable outsourced decryption by FN and ensured a real-time application. Considering the computing capacity of the sensor node, Wang et al 43 presented a fine-grained access control with distributed outsourced computing, in which the receiver and sender just executed little calculation with the help of the FN.…”
Section: Related Workmentioning
confidence: 99%
“…Integrating CP-ABE and searchable encryption, Miao et al 41 proposed an efficient fine-grained ciphertext searching system, which shifted partial computation overhead from the DU to the selected FN. Fan et al 42 introduced an access control scheme with multiple authorities for privacy preservation in the fog-assisted IoT architecture, which operated the verifiable outsourced decryption by FN and ensured a real-time application. Considering the computing capacity of the sensor node, Wang et al 43 presented a fine-grained access control with distributed outsourced computing, in which the receiver and sender just executed little calculation with the help of the FN.…”
Section: Related Workmentioning
confidence: 99%
“…After that, Vohra et al [21] introduced a proxy server to assist fog nodes to decrypt data under the multi-authority model. Fan et al [22] proposed an efficient and privacy preserving outsourced multi-authority access control scheme, which operated the verifiable outsourced decryption by fog nodes. However, most of the outsourcing schemes mentioned above do not consider user revocation and attribute revocation.…”
Section: A Related Work 1) Outsourced Computationmentioning
confidence: 99%
“…But in this scheme, two ciphertext algorithms need to be constructed to deal with different revocation situations. Fan et al [22] realized user revocation in fog computing, they prevented the proxy server from being able to decrypt data for users by deleting the proxy key stored in the cloud.…”
Section: ) User Revocationmentioning
confidence: 99%
See 1 more Smart Citation
“…An outsourced multi authority access control scheme based on attribute based encryption method is proposed in [19]. Ciphertext-policy attribute-based encryption method provides data confidentiality and fine grained access control.…”
Section: Trusted Third Party On Iotmentioning
confidence: 99%