메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 753-762

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Author keywords

Access control; Attribute update; Attribute based encryption; Fog computing; Outsourcing capability

Indexed keywords

ACCESS CONTROL; DIGITAL STORAGE; FOG; OUTSOURCING; SECURITY OF DATA;

EID: 85009274837     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.12.015     Document Type: Article
Times cited : (153)

References (32)
  • 1
    • 84906355819 scopus 로고    scopus 로고
    • Business and government organizations’ adoption of cloud computing
    • Springer Berlin, Heidelberg
    • Charif, B., Awad, A., Business and government organizations’ adoption of cloud computing. Intelligent Data Engineering and Automated Learning, IDEAL 2014, 2014, Springer, Berlin, Heidelberg, 492–501.
    • (2014) Intelligent Data Engineering and Automated Learning, IDEAL 2014 , pp. 492-501
    • Charif, B.1    Awad, A.2
  • 3
    • 84894028300 scopus 로고    scopus 로고
    • Secure role based data access control in cloud computing
    • Preiya, V., Pavithra, R., Joshi, D., Secure role based data access control in cloud computing. Int. J. Comput. Trends Technol. 1:2 (2011), 146–151.
    • (2011) Int. J. Comput. Trends Technol. , vol.1 , Issue.2 , pp. 146-151
    • Preiya, V.1    Pavithra, R.2    Joshi, D.3
  • 4
    • 84953720896 scopus 로고    scopus 로고
    • Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing
    • IEEE Computer Society
    • Deng, R., Lu, R., Lai, C., Luan, T., Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing. Proceedings of the IEEE International Conference on Communications, 2015, IEEE Computer Society, 3909–3914.
    • (2015) Proceedings of the IEEE International Conference on Communications , pp. 3909-3914
    • Deng, R.1    Lu, R.2    Lai, C.3    Luan, T.4
  • 8
    • 84928596525 scopus 로고    scopus 로고
    • An overview of fog computing and its security issues
    • Stojmenovic, I., Wen, S., Huang, X., Luan, H., An overview of fog computing and its security issues. Concurr. Comput.: Pract. Exper. 28:10 (2016), 2991–3005, 10.1016/j.future.2016.08.018.
    • (2016) Concurr. Comput.: Pract. Exper. , vol.28 , Issue.10 , pp. 2991-3005
    • Stojmenovic, I.1    Wen, S.2    Huang, X.3    Luan, H.4
  • 12
    • 84856897107 scopus 로고    scopus 로고
    • Cloud computing: challenges and future directions
    • Choo, K., Cloud computing: challenges and future directions. Trends Issues Crime Criminal Justice 400 (2010), 1–6.
    • (2010) Trends Issues Crime Criminal Justice , vol.400 , pp. 1-6
    • Choo, K.1
  • 13
    • 84991042624 scopus 로고    scopus 로고
    • Cloud cryptography: theory, practice and future research directions
    • Choo, K., Domingo-Ferrer, J., Zhang, L., Cloud cryptography: theory, practice and future research directions. Future Gener. Comput. Syst. 62:C (2016), 51–53.
    • (2016) Future Gener. Comput. Syst. , vol.62 , Issue.100 , pp. 51-53
    • Choo, K.1    Domingo-Ferrer, J.2    Zhang, L.3
  • 14
    • 85011018181 scopus 로고    scopus 로고
    • Attribute-based data access control in mobile cloud computing: taxonomy and open issues
    • Sookhak, M., Yu, F., Khan, M., Xiang, Y., Buyya, R., Attribute-based data access control in mobile cloud computing: taxonomy and open issues. Future Gener. Comput. Syst., 2016, 10.1016/j.future.2016.08.018.
    • (2016) Future Gener. Comput. Syst.
    • Sookhak, M.1    Yu, F.2    Khan, M.3    Xiang, Y.4    Buyya, R.5
  • 15
    • 84951824554 scopus 로고    scopus 로고
    • Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
    • Springer Berlin, Heidelberg
    • Yang, Y., Liu, J., Liang, K., Choo, K., Zhou, J., Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. ESORICS, 2015, Springer, Berlin, Heidelberg, 146–166.
    • (2015) ESORICS , pp. 146-166
    • Yang, Y.1    Liu, J.2    Liang, K.3    Choo, K.4    Zhou, J.5
  • 18
    • 84922031792 scopus 로고    scopus 로고
    • Attribute-based encryption optimized for cloud computing
    • Springer Berlin, Heidelberg
    • Horvath, M., Attribute-based encryption optimized for cloud computing. SOFSEM 2015: Theory and Practice of Computer Science, Vol. 8939, 2015, Springer, Berlin, Heidelberg, 566–577, 10.1007/978-3-662-46078-8_47.
    • (2015) SOFSEM 2015: Theory and Practice of Computer Science, Vol. 8939 , pp. 566-577
    • Horvath, M.1
  • 19
    • 84883281346 scopus 로고    scopus 로고
    • Improving security and efficiency in attribute-based data sharing
    • Hur, J., Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25:10 (2013), 2271–2282.
    • (2013) IEEE Trans. Knowl. Data Eng. , vol.25 , Issue.10 , pp. 2271-2282
    • Hur, J.1
  • 20
    • 84938701752 scopus 로고    scopus 로고
    • Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
    • Liang, K., Susilo, W., Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10:9 (2015), 1981–1992.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.9 , pp. 1981-1992
    • Liang, K.1    Susilo, W.2
  • 21
    • 84933040096 scopus 로고    scopus 로고
    • Privacy-preserving ciphertext multi-sharing control for big data storage
    • Liang, K., Susilo, W., Liu, J., Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10:8 (2015), 1578–1589.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.8 , pp. 1578-1589
    • Liang, K.1    Susilo, W.2    Liu, J.3
  • 22
    • 84906492583 scopus 로고    scopus 로고
    • An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
    • Springer Berlin, Heidelberg
    • Liang, K., Liu, J., Wong, D., Susilo, W., An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. ESORICS, 2014, Springer, Berlin, Heidelberg, 257–272.
    • (2014) ESORICS , pp. 257-272
    • Liang, K.1    Liu, J.2    Wong, D.3    Susilo, W.4
  • 23
    • 84936984467 scopus 로고    scopus 로고
    • Cloud based data sharing with fine-grained proxy re-encryption
    • Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., Choo, K., Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28 (2016), 122–134.
    • (2016) Pervasive Mob. Comput. , vol.28 , pp. 122-134
    • Yang, Y.1    Zhu, H.2    Lu, H.3    Weng, J.4    Zhang, Y.5    Choo, K.6
  • 24
    • 84963972226 scopus 로고    scopus 로고
    • An efficient file hierarchy attribute-based encryption scheme in cloud computing
    • Wang, S., Zhou, J., Yu, J., Joseph, K., Chen, J., Xie, W., An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11:6 (2016), 1265–1277.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.6 , pp. 1265-1277
    • Wang, S.1    Zhou, J.2    Yu, J.3    Joseph, K.4    Chen, J.5    Xie, W.6
  • 29
    • 84985919305 scopus 로고    scopus 로고
    • Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption
    • Mao, X., Lai, J., Mei, Q., Chen, K., Weng, J., Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Dependable Secure 13:5 (2016), 533–546.
    • (2016) IEEE Trans. Dependable Secure , vol.13 , Issue.5 , pp. 533-546
    • Mao, X.1    Lai, J.2    Mei, Q.3    Chen, K.4    Weng, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.