메뉴 건너뛰기




Volumn 17, Issue 6, 2017, Pages

A hybrid scheme for fine-grained search and access authorization in fog computing environment

Author keywords

Attribute based encryption; Cloud computing; Fog computing; Mediated encryption; Online offline encryption; Searchable encryption

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; DISTRIBUTED COMPUTER SYSTEMS; FOG; SECURITY OF DATA;

EID: 85021174017     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s17061423     Document Type: Article
Times cited : (37)

References (37)
  • 3
    • 84951050684 scopus 로고    scopus 로고
    • Survey of Fog Computing: Concepts, Applications and Issues
    • Hangzhou, China, 21-21 June
    • Yi, S.; Li, C.; Li, Q. A Survey of Fog Computing: Concepts, Applications and Issues. In Mobidata’15 Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China, 21-21 June 2015; pp. 37-42, doi:10.1145/2757384.2757397.
    • (2015) Mobidata’15 Proceedings of the 2015 Workshop on Mobile Big Data , pp. 37-42
    • Yi, S.1    Li, C.2    Li, Q.A.3
  • 6
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems 2013, 24(1), 131-143.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 8
    • 85011878988 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
    • Jiang, Y.; Susilo, W.; Mu, Y.; Guo, F. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 2017, doi:10.1016/j.future.2017.01.026.
    • (2017) Future Gener. Comput. Syst
    • Jiang, Y.1    Susilo, W.2    Mu, Y.3    Guo, F.4
  • 9
    • 85011802339 scopus 로고    scopus 로고
    • Towards leakage-resilient fine-grained access control in fog computing
    • Yu, Z.; Man, H.A.; Xu, Q.; Yang, R.; Han, J. Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 2017, doi:10.1016/j.future.2017.01.025.
    • (2017) Future Gener. Comput. Syst
    • Yu, Z.1    Man, H.A.2    Xu, Q.3    Yang, R.4    Han, J.5
  • 10
    • 85009274837 scopus 로고    scopus 로고
    • An efficient access control scheme with outsourcing capability and attribute update for fog computing
    • Zhang, P.; Chen, Z.; Liu, J.K.; Liang, K.; Liu, H. An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 2016, doi:10.1016/j.future.2016.12.015.
    • (2016) Future Gener. Comput. Syst
    • Zhang, P.1    Chen, Z.2    Liu, J.K.3    Liang, K.4    Liu, H.5
  • 14
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 2011, 19, 79-88.
    • (2011) J. Comput. Secur , vol.19 , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 16
    • 84904444112 scopus 로고    scopus 로고
    • Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
    • Toronto, ON, Canada, 27 April-2 May
    • Sun, W.H.; Yu, S.C.; Lou, W.J.; Hou, Y.T.; Li, H. Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In Proceedings of the INFOCOM, Toronto, ON, Canada, 27 April-2 May 2014; Volume 27, pp. 226-234.
    • (2014) Proceedings of the INFOCOM , vol.27 , pp. 226-234
    • Sun, W.H.1    Yu, S.C.2    Lou, W.J.3    Hou, Y.T.4    Li, H.5
  • 18
    • 33750246968 scopus 로고    scopus 로고
    • On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
    • Springer: Heidelberg, Germany
    • Baek, J.; Safavi-Naini, R.; Susilo, W. On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. In Information Security; Springer: Heidelberg, Germany, 2006; Volume 4176, pp. 217-232.
    • (2006) Information Security , vol.4176 , pp. 217-232
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 19
    • 84938701752 scopus 로고    scopus 로고
    • Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage
    • Liang, K.; Susilo, W. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1981-1992.
    • (2015) IEEE Trans. Inf. Forensics Secur , vol.10 , pp. 1981-1992
    • Liang, K.1    Susilo, W.2
  • 22
    • 84884802064 scopus 로고    scopus 로고
    • Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption
    • Li, J.; Chen, X.; Li, J.; Jia, C.; Ma, J.; Lou, W. Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. Comput. Secur. Esorics 2013, 8134, 592-609.
    • (2013) Comput. Secur. Esorics , vol.8134 , pp. 592-609
    • Li, J.1    Chen, X.2    Li, J.3    Jia, C.4    Ma, J.5    Lou, W.6
  • 23
    • 84958540552 scopus 로고    scopus 로고
    • Online/offline attribute-based encryption
    • Springer: Heidelberg, Germany
    • Hohenberger, S.; Waters, B. Online/offline attribute-based encryption. In Public-Key Cryptography, PKC; Springer: Heidelberg, Germany, 2014; Volume 8383, pp. 293-310.
    • (2014) Public-Key Cryptography, PKC , vol.8383 , pp. 293-310
    • Hohenberger, S.1    Waters, B.2
  • 24
    • 76649143738 scopus 로고    scopus 로고
    • Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    • Springer: Heidelberg, Germany
    • Luan, I.; Petkovic, M.; Nikova, S.; Hartel, P.; Jonker, W. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In Information Security Applications; Springer: Heidelberg, Germany, 2009; Volume 5932, pp. 309-323.
    • (2009) Information Security Applications , vol.5932 , pp. 309-323
    • Luan, I.1    Petkovic, M.2    Nikova, S.3    Hartel, P.4    Jonker, W.5
  • 25
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Sahai, A.; Waters, B. Fuzzy Identity-Based Encryption. Lect. Notes Comput. Sci. 2004, 3494, 457-473.
    • (2004) Lect. Notes Comput. Sci , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 29
    • 84969915329 scopus 로고    scopus 로고
    • Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds
    • Tysowski, P.K.; Hasan, M.A. Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Trans. Cloud Comput. 2013, 1, 172-186.
    • (2013) IEEE Trans. Cloud Comput , vol.1 , pp. 172-186
    • Tysowski, P.K.1    Hasan, M.A.2
  • 30
    • 38349070353 scopus 로고    scopus 로고
    • Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
    • Springer: Heidelberg, Germany
    • Zhang, R.; Imai, H. Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. In Cryptology and Network Security; Springer: Heidelberg, Germany, 2007; pp. 159-174.
    • (2007) Cryptology and Network Security , pp. 159-174
    • Zhang, R.1    Imai, H.2
  • 31
    • 84955417982 scopus 로고    scopus 로고
    • Generic constructions of integrated PKE and PEKS
    • Chen, Y.; Zhang, J.; Lin, D.; Zhang, Z. Generic constructions of integrated PKE and PEKS. Des. Codes Cryptogr. 2016, 78, 493-526.
    • (2016) Des. Codes Cryptogr , vol.78 , pp. 493-526
    • Chen, Y.1    Zhang, J.2    Lin, D.3    Zhang, Z.4
  • 33
    • 70350676849 scopus 로고    scopus 로고
    • An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data
    • Jeju Island, Korea, 23-25 September
    • Wang, P.; Wang, H.; Pieprzyk, J. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. In Proceedings of International Workshop on Information Security Applications, Jeju Island, Korea, 23-25 September 2008; Volume 5379, pp. 145-159.
    • (2008) Proceedings of International Workshop on Information Security Applications , vol.5379 , pp. 145-159
    • Wang, P.1    Wang, H.2    Pieprzyk, J.3
  • 34
    • 84963527101 scopus 로고    scopus 로고
    • Protecting Your Right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
    • Sun, W.; Yu, S.; Lou, W.; Hou, Y.T.; Li, H. Protecting Your Right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 1187-1198.
    • (2016) IEEE Trans. Parallel Distrib. Syst , vol.27 , pp. 1187-1198
    • Sun, W.1    Yu, S.2    Lou, W.3    Hou, Y.T.4    Li, H.5
  • 35
    • 45749099677 scopus 로고    scopus 로고
    • accssed on 26 July
    • Cohen, W.W. Enron Email Dataset. Available online: https://www.cs.cmu.edu/enron/ (accssed on 26 July 2016).
    • (2016) Enron Email Dataset
    • Cohen, W.W.1
  • 36
    • 85021076582 scopus 로고    scopus 로고
    • accssed on 12 May
    • Pairing-Based Cryptography Libray. Available online: http://crypto.stanford.edu/pbc/ (accssed on 12 May 2017).
    • (2017)
  • 37


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.