Article
Computer Science, Information Systems
Payal Chaudhari, Manik Lal Das
Summary: Searchable encryption allows cloud servers to search encrypted data without decryption. Single keyword-based encryption enables users to access subsets of documents containing specific keywords. The scheme presented in this paper uses attribute-based encryption to grant access to selective data subsets while maintaining user privacy.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2021)
Article
Computer Science, Information Systems
Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu
Summary: Healthcare Internet-of-Things (IoT) is a new paradigm that connects embedded devices to the cloud for monitoring patient vital signals and data aggregation. However, there are security concerns with the cloud due to untrusted network environments and limited resources. To address this, this paper proposes a novel healthcare IoT system that combines attribute-based encryption, cloud and edge computing to provide efficient, flexible, secure fine-grained access control and data verification, without the need for a secure channel.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Article
Engineering, Civil
Yangyang Bao, Weidong Qiu, Xiaochun Cheng, Jianfei Sun
Summary: The Internet of Vehicles (IoV) has revolutionized the driving experience and urban traffic management. This paper proposes an efficient access control scheme and an indirect revocation mechanism to address data leakage and personal privacy concerns in the publicly accessible IoV environment. Through detailed comparisons and simulation evaluations, the superiority of the proposed solutions in terms of functionality and performance is demonstrated.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Biochemical Research Methods
Qinlong Huang, Wei Yue, Yixian Yang, Lixuan Chen
Summary: With the development of bioinformatics and genetic sequencing technologies, genomic data is widely used in personalized medicine. Cloud computing provides a cost-effective and efficient solution for the challenges brought by massive genomic data. This paper proposes P2GT and P2GT+ schemes that utilize encryption techniques and equality tests to protect and authorize genetic testing in cloud computing, and experimental results demonstrate their practicality and scalability.
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS
(2022)
Article
Computer Science, Hardware & Architecture
Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng
Summary: This article introduces a cloud-fog-device data sharing system based on matchmaking attribute-based encryption (MABE), which provides data confidentiality and data source identification simultaneously. The system offers secure fine-grained bilateral access control and performance optimization, outperforming related solutions in terms of functionality and performance.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Haijiang Wang, Jianting Ning, Xinyi Huang, Guiyi Wei, Geong Sen Poh, Ximeng Liu
Summary: The popularity of e-Healthcare systems has been increasing with the introduction of wearable healthcare devices and sensors, which collect personal health records stored in a remote cloud. To ensure privacy and secure access control, attributes based encryption (ABE) and searchable encryption are being utilized. This efficient hidden policy ABE scheme with keyword search enables efficient keyword search with constant computational overhead and storage overhead, while also enhancing recipient's privacy by hiding the access policy. Additionally, a trapdoor malleability attack is presented, revealing potential vulnerabilities in previous schemes.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
XiaoXu Zhang, Run-hua Shi, WanPeng Guo, PengBo Wang, WeiYang Ke
Summary: Devices and edges of the IoT work together to enhance sensing capability, causing increased concern for protecting personal sensory information privacy in smart homes. Attribute-based encryption (ABE) is widely used to enable secure data sharing in this scenario. However, the computational complexity of ABE makes it difficult for resource-constrained devices. Edge computing solves this problem by offloading heavy cryptographic operations to an edge server (ES) and uploading device data to a cloud. To ensure data integrity and correctness, a lightweight dual auditing scheme is proposed, utilizing data block aggregation, signatures, and Zero-Knowledge (ZK) proof. A smart contract is used for data user authentication to prevent collusion attacks. Simulation experiments confirm the efficiency of the proposed multiple auditing scheme.
Article
Computer Science, Information Systems
Zuobin Ying, Wenjie Jiang, Ximeng Liu, Shengmin Xu, Robert H. Deng
Summary: Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a powerful encryption paradigm for data confidentiality in cloud data sharing. However, the access policy in traditional CP-ABE reveals sensitive information. To address this, this article proposes a novel CP-ABE system called Privacy-Preserving Policy Updating ABE (3PU-ABE), which utilizes a security-enhanced Attribute Cuckoo Filter (se-ACF) to hide the access policy and enable policy updating.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
K. Dhal, S. C. Rai, P. K. Pattnaik, S. Tripathy
Summary: The article introduces a scheme named CEMAR to tackle data sharing security issues in cloud computing. The scheme improves communication efficiency while reducing computational burdens at the user end, and the security is verified using the Random-Oracle assumption.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Hua Deng, Zheng Qin, Qianhong Wu, Robert H. Deng, Zhenyu Guan, Yupeng Hu, Fangmin Li
Summary: Cloud computing is popular for data storage and sharing. Encryption is important for data security, but can hinder data sharing. This article proposes a hierarchical data sharing scheme that allows the data owner to selectively share encrypted data with users in a hierarchy, providing control over access.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Information Systems
Jie Cui, Xuelian Chen, Jing Zhang, Qingyang Zhang, Hong Zhong
Summary: This study proposes a fine-grained access control scheme to restrict applications' access to data in connected and autonomous vehicles (CAVs). The system model includes a trusted third party, perception components, and multiple applications. The use of fast attribute-based encryption and a key update scheme based on the Chinese remainder theorem, along with theoretical analysis and simulation experiments, demonstrates the feasibility and efficiency of this approach.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Hui Ma, Rui Zhang, Shuzhou Sun, Zishuai Song, Gaosheng Tan
Summary: This paper introduces an innovative application of attribute-based encryption in cloud storage services, which enables fine-grained access control over encrypted data. By leveraging the storage, computing, and management capabilities of the cloud, efficient access control and user revocation are achieved, and most of the complex operations are outsourced to the public cloud server.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Suhui Liu, Liquan Chen, Ge Wu, Huaqun Wang, Hongtao Yu
Summary: This article proposes a blockchain-backed data sharing framework for personal health records (PHRs) and designs a blockchain-backed searchable proxy signcryption scheme. The scheme achieves reliable data search and tracing, while ensuring patient authorization and data security.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Computer Science, Information Systems
Peixuan He, Kaiping Xue, Jiayu Yang, Qiudong Xia, Jianqing Liu, David S. L. Wei
Summary: The paper proposes a Fine-grained Accountable and Space-Efficient access control scheme, named FASE, for multimedia content distribution. FASE allows content providers to be fully offline and ensures secure fine-grained access control through attribute-based encryption at multimedia content provider side and access policy based authentication at the edge router side.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2021)
Article
Computer Science, Artificial Intelligence
Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Yuanzhang Li, Shangbo Wu
Summary: The proposed secure data-sharing model for intelligent terminals in multi-domain settings ensures fine-grained and traceable sharing of data through key self-certification algorithm and blockchain technology.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Computer Science, Information Systems
Jiguo Li, Yao Wang, Yichen Zhang, Jinguang Han
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2020)
Article
Computer Science, Information Systems
Jiguo Li, Hao Yan, Yichen Zhang
Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Jiguo Li, Min Wang, Yang Lu, Yichen Zhang, Huaqun Wang
Summary: To ensure security and privacy in cloud data storage, attribute-based keyword search (ABKS) allows data owners to upload encrypted data and authorize specific users to retrieve it. However, the vulnerability to keyword guessing attacks is a key issue, which is addressed in this paper by using data owner's private key to sign keywords and prevent unauthorized keyword generation. The proposed ABKS scheme is secure against chosen-plaintext attacks and demonstrates practical performance.
COMPUTER STANDARDS & INTERFACES
(2021)
Article
Computer Science, Information Systems
Jiguo Li, Hao Yan, Yichen Zhang
Summary: This article proposes a new Identity-based RDIC scheme that utilizes a homomorphic verifiable tag to reduce system complexity, while also masking original data with random integer addition to protect data privacy. The scheme is proven to be secure under the assumption of computational Diffie-Hellman problem and is shown to be efficient and feasible for real-life applications through experiment results.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Jiguo Li, Hongwei Li, Jianfeng Ma
Summary: CP-ABKS system enables search queries and fine-grained access control over encrypted data in the cloud, but lacks effective support for shared multi-owner settings and privacy protection. The proposed ABKS-SM systems emphasize privacy preservation and malicious user tracing, with features of selective security and resistance to offline keyword-guessing attacks.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Automation & Control Systems
Yang Lu, Jiguo Li, Fen Wang
Summary: Industrial IoT (IIoT) is an practical application of the Internet of Things (IoT) in modern industry that accelerates industrial development. The recent certificate-based encryption with keyword search (CBEKS) scheme aims to address data privacy protection in the cloud, showing advantages in computation performance and security against keyword guessing attacks.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Artificial Intelligence
Wenjuan Li, Lishan Ke, Weizhi Meng, Jinguang Han
Summary: The Internet of Things (IoT) is adopted by many organizations for information collection and sharing. Malicious emails are a security challenge for IoT systems, and email classification using machine learning is a key solution. Empirical research shows that LibSVM and SMO-SVM perform better in email classification.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Computer Science, Information Systems
Peng Yi, Jiguo Li, Chengdong Liu, Jinguang Han, Huaqun Wang, Yichen Zhang, Yu Chen
Summary: This paper introduces an efficient identity-based signature scheme that is proved secure under the standard model. The scheme's security is reduced to the well-known computational Diffie-Hellman assumption, and it outperforms related schemes in terms of computation cost for signing and verification.
INFORMATION SCIENCES
(2021)
Editorial Material
Computer Science, Information Systems
Weizhi Meng, Wenjuan Li, Jinguang Han, Chunhua Su
SECURITY AND COMMUNICATION NETWORKS
(2022)
Article
Computer Science, Information Systems
Jiguo Li, Yu Chen, Jinguang Han, Chengdong Liu, Yichen Zhang, Huaqun Wang
Summary: Devices of Internet of Things (IoT) generate a large amount of data, which poses secure authentication and access control challenges. Attribute-based signature (ABS) provides privacy-preserving access control and data authentication by signing a message over a set of attributes. Existing multiauthority ABS schemes face risks when the central authority is compromised and require expensive operations for resource-limited devices. To address these issues, a decentralized attribute-based server-aid signature (DABSAS) scheme is proposed, which offers anonymity, unforgeability, and alleviates the burden of signature and verification. The scheme is proven secure under the co-CDH assumption and demonstrates efficiency compared to existing schemes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Song Li, Jinguang Han, Deyu Tong, Jie Cui
Summary: To ensure the integrity of data stored in a cloud server, data owners need to use public auditing techniques. However, if data is modified dynamically during the data anonymization process, the auditing result becomes invalid. Therefore, we propose a new scheme based on redactable signatures, which allows direct transformation of signatures when sharing sensitive data, without the need for additional data sanitizers.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
Yu Chen, Jiguo Li, Chengdong Liu, Jinguang Han, Yichen Zhang, Peng Yi
Summary: The study introduced a novel Attribute Based Signature (ABS) scheme using attribute tree as access policy for flexible access control and employing server-aid technique to reduce computation burden of the verifier. This scheme is proven secure against chosen-policy selective-message attack in the standard model and is more efficient in private key generation and verification compared to existing schemes.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Jiguo Li, Ruyuan Zhang, Yang Lu, Jinguang Han, Yichen Zhang, Wenzheng Zhang, Xinfeng Dong
Summary: In this article, the concept of multiauthority attribute-based encryption (MA-ABE) is introduced, and a scheme for assuring data deletion is designed. The scheme not only addresses the key escrow issue, but also prevents collusion attacks between malicious and unauthorized users.
IEEE SYSTEMS JOURNAL
(2023)
Article
Computer Science, Information Systems
Jiguo Li, Ningyu Chen, Yichen Zhang
Summary: In this paper, an efficient extended file hierarchy CP-ABE scheme (EFH-CP-ABE) is proposed to encrypt multiple files on the same access level for secure cloud storage. This scheme is practical and beneficial for big institutions or companies that have many hierarchical sectors.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
(2021)
Article
Computer Science, Information Systems
Chen Shen, Yang Lu, Jiguo Li