Article
Computer Science, Artificial Intelligence
Arthur S. Voundi Koe, Qi Chen, Juan Tang, Shan Ai, Hongyang Yan, Shiwen Zhang, Duncan S. Wong
Summary: With the increasing use of mobile devices in cloud computing, researchers have proposed a cloud-based access control encryption method for recording and protecting patients' medical data. However, existing methods have some issues, such as relying on trusted authorities and high processing and communication costs. Therefore, this study presents a novel, efficient, and secure multiauthority ciphertext-policy ABE method to address these issues.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Computer Science, Hardware & Architecture
Hassan Nasiraee, Maede Ashouri-Talouki
Summary: This paper introduces the Edge-Fog-Cloud interplay in the Internet-of-Things (IoT) and proposes a new Privacy-preserving Distributed data Access control (PDAC) system. The PDAC system improves the previous distributed ABE systems by introducing user's anonymity approach, novel policy-hiding mechanism, and independent-authorities system, while enhancing efficiency through offloading user's computations to the Cloud servers.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Richa Sarma, Chandan Kumar, Ferdous Ahmed Barbhuiya
Summary: This paper proposes a CP-ABE scheme named PAC-FIT that supports key-escrow resistance, attribute revocation, and attribute addition features. Additionally, expensive encryption and decryption operations are outsourced to fog nodes, reducing computational overhead for resource constrained IoT devices. Attribute revocation and addition tasks are also outsourced to third parties efficiently.
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS
(2021)
Article
Computer Science, Information Systems
Leyou Zhang, Yadi Ye, Yi Mu
Summary: This article introduces a patient-centric personal health record sharing framework, which protects PHRs through multiauthority attribute-based encryption and proposes anonymous authentication between the cloud and the user to protect data integrity and user privacy. The proposed authentication system can resist collusion attacks, enhancing patients' control over their health records.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Jing Zhao, Peng Zeng, Kim-Kwang Raymond Choo
Summary: Fog computing is popular for minimizing data transfer and latency requirements, and an efficient CP-ABE scheme called AC-FEH has been proposed to achieve fine-grained access control in fog-enabled environments. In the AC-FEH system, fog nodes handle data encryption and decryption operations, reducing computational costs for data owners and users. Compared to competing schemes, AC-FEH also lowers computational costs associated with encryption and decryption.
Article
Computer Science, Information Systems
Qingxuan Wang, Chi Cheng, Rui Xu, Jintai Ding, Zhe Liu
Summary: The authors introduce the DOPIV scheme, which allows a data owner to delegate a proxy to generate data signatures and outsource them to a cloud server. They use a third-party auditor to verify the integrity of the outsourced data. However, the authors discover vulnerabilities in DOPIV that enable the cloud server to delete data without being noticed. They propose a simple and efficient solution to thwart this attack while maintaining all the claimed features of DOPIV.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Yongkai Fan, Jiaxu Liu, Kuan-Ching Li, Wei Liang, Xia Lei, Gan Tan, Mingdong Tang
Summary: This research proposes an access control scheme for Android devices to prevent authentication bypass attacks and protect data confidentiality. Attribute-Based Encryption is used to design fine-grained data access at the app level for data confidentiality on the local side. Trusted Execution Environment acts as a trusted computing environment to protect encrypted data from unauthorized access.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
S. Sabitha, M. S. Rajasree
Summary: This paper investigates an on-demand access control mechanism for flexible data sharing in the cloud, addressing issues related to user revocation, attribute revocation, forward secrecy and backward secrecy. The proposed method allows for tunable access control over shared data, producing constant size ciphertext and compact secret keys to reduce communication cost and optimize storage space. It also provides granularity levels at user-level, file-level, and attribute-level for dynamic data updates and user manipulation privilege verification.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Jianting Ning, Xinyi Huang, Willy Susilo, Kaitai Liang, Ximeng Liu, Yinghui Zhang
Summary: Cloud-based data storage service has gained increasing attention due to its efficient and low-cost management. To ensure data confidentiality and user privacy, service providers need to utilize secure data storage and sharing mechanisms. In this article, the authors propose two dual access control systems and analyze their security.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Jiahao Li, Dongmei Li, Xiaomei Zhang
Summary: IoT-based smart healthcare system enables remote monitoring and diagnosis of patients, alleviating overcrowding in hospitals. A blockchain-based access control scheme is proposed to protect patient privacy, and computational tasks are outsourced to fog nodes, enhancing system security and performance.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu
Summary: Healthcare Internet-of-Things (IoT) is a new paradigm that connects embedded devices to the cloud for monitoring patient vital signals and data aggregation. However, there are security concerns with the cloud due to untrusted network environments and limited resources. To address this, this paper proposes a novel healthcare IoT system that combines attribute-based encryption, cloud and edge computing to provide efficient, flexible, secure fine-grained access control and data verification, without the need for a secure channel.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Article
Computer Science, Information Systems
Xin Wei, Yong Yan, Shaoyong Guo, Xuesong Qiu, Feng Qi
Summary: As IoT services become more advanced, data sharing among different IoT systems is increasingly popular. To address the trust and security challenges faced by traditional IoT systems that rely on central clouds for data storage and access, we propose a multicenter data management framework based on blockchain to create a trusted environment for data sharing. We also introduce an attribute-based encryption algorithm that can be used for multicenter scenarios and shift the data management to blockchain instead of a central server. Additionally, we design an obfuscating policy to offload encryption computations to the cloud, reducing the computational burden on IoT devices.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Interdisciplinary Applications
Tsozen Yeh, Yulin Chen
Summary: This paper discusses how to accelerate job execution speed in hybrid cloud environments by optimizing the data transfer process. By designing and implementing a new model, the execution time of jobs was reduced significantly, improving data access efficiency and having a positive impact on cloud computing environments.
SIMULATION MODELLING PRACTICE AND THEORY
(2021)
Article
Computer Science, Information Systems
Gyeongjin Ra, Donghyun Kim, Daehee Seo, Imyeong Lee
Summary: This paper proposes a novel data-owner-driven privacy-aware cloud data acquisition framework for intelligent big data analytics. The framework includes a new global identity provider concept, an ambiguous data acquisition mechanism, and a Decentralized Audit and Ordering (DAO) Chain mechanism. The efficiency of this framework is demonstrated to be superior to existing alternatives.
Article
Computer Science, Information Systems
Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Hui Yin
Summary: This study proposes a revocable attribute-based data storage (RADS) scheme to address the high computation overheads of existing attribute-based encryption (ABE) schemes on mobile devices. The RADS scheme achieves fine-grained access control, allows computation offloading, and handles revocation process efficiently.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)