2017
DOI: 10.1109/access.2017.2727054
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
78
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 119 publications
(80 citation statements)
references
References 29 publications
2
78
0
Order By: Relevance
“…Lyu et al [14] proposed the PPFA privacy protection aggregation system that uses the stability of a Gauss mechanism to ensure the differential privacy of the statistical results and reduces the loss of privacy by combining a stream cipher with a public key cipher to maintain practicability. Huang et al [15] proposed an attribute-based encryption scheme that makes full use of fog servers. e collected data is encrypted by fog servers and then outsourced to cloud servers.…”
Section: Sensitive Data Protection Based On Fog Computingmentioning
confidence: 99%
“…Lyu et al [14] proposed the PPFA privacy protection aggregation system that uses the stability of a Gauss mechanism to ensure the differential privacy of the statistical results and reduces the loss of privacy by combining a stream cipher with a public key cipher to maintain practicability. Huang et al [15] proposed an attribute-based encryption scheme that makes full use of fog servers. e collected data is encrypted by fog servers and then outsourced to cloud servers.…”
Section: Sensitive Data Protection Based On Fog Computingmentioning
confidence: 99%
“…Huang et al [14] proposed a CP-ABE scheme to support data security and fine-grained data access control, using features such as ciphertext updating and computation outsourcing for fog computing with IoT devices. As Zuo et al [28] also found, their scheme's main problem is that it was only suitable with an AND-gate encryption predicate.…”
Section: A Access Controlmentioning
confidence: 99%
“…The literature review reveals the challenges and limitations of the existing protocols as reviewed in [1][2][3][4][5] [18][19][20]. The existing schemes are robust for the direct attacks but present day adversaries are possessing different strategies to get into the system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The existing CP-ABE techniques as given in [1][2][3] presents the insight and overview of the scheme and accountability about the CP-ABE scheme has been elaborated in [7] [14]. From the observation, it is clear that the practical possibility of using the CP-ABE is much better to secure the end point devices which are associated to Fog end points.…”
Section: Introductionmentioning
confidence: 99%