Article
Computer Science, Hardware & Architecture
Hua Deng, Jixin Zhang, Zheng Qin, Qianhong Wu, Hui Yin, Aniello Castiglione
Summary: This paper presents a Policy-based Broadcast Access Authorization (PBAA) scheme by introducing identity-based broadcast encryption (IBBE) and key-policy attribute-based encryption into proxy re-encryption (PRE), enabling secure and flexible cloud data sharing.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Ran Ding, Yan Xu, Hong Zhong, Jie Cui, Kewei Sha
Summary: This paper proposes a novel approach for fully anonymous integrity checking and reliability authentication for cloud data sharing. By designing a predicate and constructing Lagrange interpolation polynomials, participants can modify data and perform data authentication while remaining anonymous. Traceability and revocation of participant identity are also considered.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Amit Kumar Dwivedi, Naveen Kumar, Manik Lal Das
Summary: Data freshness is crucial for achieving high business values and effective customer service. In a distributed outsourced environment, group data freshness can be challenging. This paper proposes an efficient group data freshness auditing scheme using Merkle hash trees for real-time verification, resulting in reduced computational and communication costs.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Hardware & Architecture
Jian Shen, Huijie Yang, Pandi Vijayakumar, Neeraj Kumar
Summary: This article proposes a privacy-preserving and untraceable scheme for multi-party data sharing in cloud computing, based on proxy re-encryption algorithm and oblivious random access memory. The scheme ensures the security and privacy of shared data through key exchange and obfuscation operations. The protocol designed in this article meets the security requirements of proxy re-encryption and ORAM, and is proven to be secure and efficient through theoretical and experimental analysis.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Theory & Methods
Wei Wei, Haoyi Li, Weidong Yang
Summary: This paper proposes a hierarchical and distributed multicloud architecture to support distributed upper-level services such as edge or fog computing. By considering intra-time slot demand fluctuation and multidimensional resource sharing, better solutions can be obtained, but the scheduling problem becomes highly complicated. To solve this problem effectively and efficiently, a method is proposed and its superiority is demonstrated in experiments.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Information Systems
Samuel D. Okegbile, Jun Cai, Attahiru S. Alfa
Summary: In this article, we investigated a collaborative data-sharing scheme using blockchain and cloud-edge computing techniques. The results showed that the proposed analysis method can be beneficial for studying the performance of any blockchain-enabled data-sharing system.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Chunpeng Ge, Zhe Liu, Jinyue Xia, Liming Fang
Summary: Cloud computing relies on massive storage and computing capabilities, making secure data sharing crucial. Recent IB-BPRE schemes aim to address this, but involve users in the complex key sharing process. To simplify this, a new RIB-BPRE scheme allows proxies to revoke specific users from the re-encryption key, making it efficient and practical.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Computer Science, Information Systems
Caihui Lan, Haifeng Li, Caifen Wang
Summary: Researchers identified a security vulnerability in an existing scheme and proposed a solution, but later found that the proposed solution also had a loophole that could be exploited by malicious cloud servers. They provided a revised solution to address the issue.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Bowen Hu, Yingwen Chen, Hujie Yu, Linghang Meng, Zhimin Duan
Summary: This article proposes a distributed, efficient, and secure data-sharing scheme centered on consumer IoT devices by combining blockchain and smart contracts technology, solving the problems of prolonged communication delay and privacy leakage in traditional cloud-based IoT, and proving its feasibility through simulated experiments.
IEEE CONSUMER ELECTRONICS MAGAZINE
(2022)
Article
Computer Science, Theory & Methods
Zishuai Song, Hui Ma, Rui Zhang, Wenhan Xu, Jianhao Li
Summary: Cloud-edge computing is a new paradigm for data sharing, in which computation tasks are assigned to multiple edge nodes to reduce the burden on the cloud and real-time services are provided for IoT devices. Data privacy and real-world deployment are major issues in cloud-edge computing. This work proposes a new cryptographic primitive called COAB-PRE for access control and a universal implementation framework for cross-platform deployment.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Information Systems
Josep Sampe, Marc Sanchez-Artigas, Gil Vernik, Ido Yehekzel, Pedro Garcia-Lopez
Summary: Lithops is a new platform that enables untrained users to execute single-machine code at massive scale in the cloud through Functions-as-a-Service platforms like AWS Lambda, democratizing massive-scale data parallelism.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Caihui Lan, Caifen Wang, Haifeng Li, Liangliang Liu
Summary: In this letter, the security weaknesses of Wang et al.'s attribute-based data sharing scheme are discussed, and two serious security flaws in their scheme are identified through concrete attacks. The authors present a remedy solution to the issues to avoid similar design flaws in future designs.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Hardware & Architecture
Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang
Summary: The article introduces a novel verifiable and fair attribute-based proxy re-encryption (VF-ABPRE) scheme to address the challenges in managing outsourced encrypted data sharing in clouds. The scheme allows users to verify the correctness of the re-encrypted ciphertext returned by the server and ensures that the server can escape from malicious accusations.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Weiting Zhang, Hanyi Zhang, Liming Fang, Zhe Liu, Chunpeng Ge
Summary: This article proposes a secure and revocable fine-grained access control and data sharing scheme for SCADA systems in industrial control and the IoT. The scheme enhances data security through fine-grained access control and digital signature technology.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Rudolf Lovrencic, Dejan Skvorc
Summary: This paper introduces a method to protect data privacy while enabling data processing in the cloud. It utilizes constraint-based data and code fragmentation and deploys these fragments to multiple independent computer clouds. The paper presents several architectural patterns for secure computation in a multi-cloud environment, demonstrates the use of the method, and examines the introduced performance penalty on a simple application.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2023)