메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 12941-12950

Correction to: Secure Data Access Control with Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things (IEEE Access (2017) 5:1 (12941-12950) DOI: 10.1109/ACCESS.2017.2727054);Secure Data Access Control with Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things

Author keywords

access control; attribute based encryption; attribute based signature; data security; fog computing; Internet of Things

Indexed keywords

ACCESS CONTROL; DIGITAL STORAGE; FOG; FOG COMPUTING; INTERNET OF THINGS; OUTSOURCING; SECURITY OF DATA;

EID: 85028941814     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2018.2823178     Document Type: Erratum
Times cited : (135)

References (37)
  • 1
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: A survey on security challenges in cloud computing
    • Jan.
    • C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing, " Comput. Elect. Eng., vol. 39, no. 1, pp. 47-54, Jan. 2013.
    • (2013) Comput. Elect. Eng. , vol.39 , Issue.1 , pp. 47-54
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 3
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions, " Future Generat. Comput. Syst., vol. 29, no. 7, pp. 1645-1660, 2013.
    • (2013) Future Generat. Comput. Syst. , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 5
    • 85020469257 scopus 로고    scopus 로고
    • Security and privacy preservation scheme of face identification and resolution frame-work using fog computing in Internet of Things
    • P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, "Security and privacy preservation scheme of face identification and resolution frame-work using fog computing in Internet of Things, " IEEE Internet Things J. [Online]. Available: https://doi. org/10. 1109/JIOT. 2017. 2659783
    • IEEE Internet Things J.
    • Hu, P.1    Ning, H.2    Qiu, T.3    Song, H.4    Wang, Y.5    Yao, X.6
  • 6
    • 84942810277 scopus 로고    scopus 로고
    • EABDS: Attribute-based secure data sharing with efficient revocation in cloud computing
    • Q. Huang, Z. Ma, Y. Yang, J. Fu, and X. Niu, "EABDS: attribute-based secure data sharing with efficient revocation in cloud computing, " Chin. J. Electron., vol. 24, no. 4, pp. 862-868, 2015.
    • (2015) Chin. J. Electron. , vol.24 , Issue.4 , pp. 862-868
    • Huang, Q.1    Ma, Z.2    Yang, Y.3    Fu, J.4    Niu, X.5
  • 7
    • 85019142762 scopus 로고    scopus 로고
    • DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
    • May
    • Q. Huang, L. Wang, and Y. Yang, "DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices, " in World Wide Web. May 2017. [Online]. Available: https://doi. org/10. 1007/s11280-017-0462-0
    • (2017) World Wide Web.
    • Huang, Q.1    Wang, L.2    Yang, Y.3
  • 8
    • 84881327557 scopus 로고    scopus 로고
    • Achieving secure and efficient data collaboration in cloud computing
    • Montreal, QC, Canada, Jun.
    • X. Dong, J. Yu, Y. Luo, Y. Chen, G. Xue, and M. Li, "Achieving secure and efficient data collaboration in cloud computing, " in Proc. IEEE/ACM 21st Int. Symp. Quality Service, Montreal, QC, Canada, Jun. 2013, pp. 195-200.
    • (2013) Proc. IEEE/ACM 21st Int. Symp. Quality Service , pp. 195-200
    • Dong, X.1    Yu, J.2    Luo, Y.3    Chen, Y.4    Xue, G.5    Li, M.6
  • 9
    • 79956336417 scopus 로고    scopus 로고
    • Realizing fine-grained and fiexible access control to outsourced data with attribute-based cryptosystems
    • Guangzhou, China
    • F. Zhao, T. Nishide, and K. Sakurai, "Realizing fine-grained and fiexible access control to outsourced data with attribute-based cryptosystems, " in Proc. Inf. Secur. Pract. Exper.-7th Int. Conf., Guangzhou, China, 2011, pp. 83-97.
    • (2011) Proc. Inf. Secur. Pract. Exper.-7th Int. Conf. , pp. 83-97
    • Zhao, F.1    Nishide, T.2    Sakurai, K.3
  • 11
    • 84891761004 scopus 로고    scopus 로고
    • Decentralized access control with anonymous authentication of data stored in clouds
    • Feb.
    • S. Ruj, M. Stojmenovic, and A. Nayak, "Decentralized access control with anonymous authentication of data stored in clouds, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 384-394, Feb. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.2 , pp. 384-394
    • Ruj, S.1    Stojmenovic, M.2    Nayak, A.3
  • 12
    • 84991240131 scopus 로고    scopus 로고
    • Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    • Jul.
    • Q. Huang, Y. Yang, and M. Shen, "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing, " Future Generat. Comput. Syst., vol. 72, pp. 239-249, Jul. 2017.
    • (2017) Future Generat. Comput. Syst. , vol.72 , pp. 239-249
    • Huang, Q.1    Yang, Y.2    Shen, M.3
  • 13
    • 85018495637 scopus 로고    scopus 로고
    • A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
    • R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT, " IEEE Access, vol. 5, pp. 3302-3312, 2017.
    • (2017) IEEE Access , vol.5 , pp. 3302-3312
    • Lu, R.1    Heung, K.2    Lashkari, A.H.3    Ghorbani, A.A.4
  • 14
    • 84961877275 scopus 로고    scopus 로고
    • On security and pri-vacy issues of fog computing supported Internet of Things environment
    • Montreal, QC, Canada, Sep.
    • K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, "On security and pri-vacy issues of fog computing supported Internet of Things environment, " in Proc. Int. Conf. Netw. Future, Montreal, QC, Canada, Sep. 2015, pp. 1-3.
    • (2015) Proc. Int. Conf. Netw. Future , pp. 1-3
    • Lee, K.1    Kim, D.2    Ha, D.3    Rajput, U.4    Oh, H.5
  • 17
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • New York, NY, USA
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. 13th ACMConf. Comput. Commun. Secur., New York, NY, USA, 2006, pp. 89-98.
    • (2006) Proc. 13th ACMConf. Comput. Commun. Secur. , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 18
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • Berkeley, CA, USA, Mays
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption, " in Proc. IEEE Symp. Secur. Privacy, Berkeley, CA, USA, Mays 2007, pp. 321-334.
    • (2007) Proc. IEEE Symp. Secur. Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 19
    • 80053267265 scopus 로고    scopus 로고
    • Distributed fine-grained access control in wireless sensor networks
    • Anchorage, AK, USA, May
    • S. Ruj, A. Nayak, and I. Stojmenovic, "Distributed fine-grained access control in wireless sensor networks, " in Proc. IEEE Int. Parallel Distrib. Process. Symp., Anchorage, AK, USA, May 2011, pp. 352-362.
    • (2011) Proc. IEEE Int. Parallel Distrib. Process. Symp. , pp. 352-362
    • Ruj, S.1    Nayak, A.2    Stojmenovic, I.3
  • 20
    • 79952071204 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • Apr.
    • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 4, pp. 673-686, Apr. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.4 , pp. 673-686
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 21
    • 84979966798 scopus 로고    scopus 로고
    • Secure and efficient data communication protocol for wireless body area networks
    • Apr./Jun.
    • C. Hu, H. Li, Y. Huo, T. Xiang, and X. Liao, "Secure and efficient data communication protocol for wireless body area networks, " IEEE Trans. Multi-Scale Comput. Syst., vol. 2, no. 2, pp. 94-107, Apr./Jun. 2016.
    • (2016) IEEE Trans. Multi-Scale Comput. Syst. , vol.2 , Issue.2 , pp. 94-107
    • Hu, C.1    Li, H.2    Huo, Y.3    Xiang, T.4    Liao, X.5
  • 22
    • 85011878988 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
    • Jan.
    • Y. Jiang, W. Susilo, Y. Mu, and F. Guo, "Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing, " Future Generat. Comput. Syst., Jan. 2017. [Online]. Available: https://doi. org/10. 1016/j. future. 2017. 01. 026
    • (2017) Future Generat. Comput. Syst.
    • Jiang, Y.1    Susilo, W.2    Mu, Y.3    Guo, F.4
  • 23
    • 85032613000 scopus 로고    scopus 로고
    • Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revoca-tion
    • Oct.
    • L.-Y. Yeh, P.-Y. Chiang, Y.-L. Tsai, and J.-L. Huang, "Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revoca-tion, " IEEE Trans. Cloud Comput., Oct. 2015. [Online]. Available: https://doi. org/10. 1109/TCC. 2015. 2485199
    • (2015) IEEE Trans. Cloud Comput.
    • Yeh, L.-Y.1    Chiang, P.-Y.2    Tsai, Y.-L.3    Huang, J.-L.4
  • 24
    • 84962022357 scopus 로고    scopus 로고
    • New Publicly veri-able databases with efficient updates
    • Sep.
    • X. Chen, J. Li, X. Huang, J. Ma, and W. Lou, "New Publicly veri-able databases with efficient updates, " IEEE Trans. Depend. Sec. Comput., vol. 12, no. 5, pp. 546-556, Sep. 2015.
    • (2015) IEEE Trans. Depend. Sec. Comput. , vol.12 , Issue.5 , pp. 546-556
    • Chen, X.1    Li, J.2    Huang, X.3    Ma, J.4    Lou, W.5
  • 25
    • 84906242615 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Sep.
    • X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2386-2396, Sep. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.9 , pp. 2386-2396
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 27
    • 84991826598 scopus 로고    scopus 로고
    • Lightweight attribute-based encryption for the Internet of Things
    • Waikoloa, HI, USA, Aug.
    • N. Oualha and K. T. Nguyen, "Lightweight attribute-based encryption for the Internet of Things, " in Proc. 25th Int. Conf. Comput. Commun. Netw., Waikoloa, HI, USA, Aug. 2016, pp. 1-6.
    • (2016) Proc. 25th Int. Conf. Comput. Commun. Netw. , pp. 1-6
    • Oualha, N.1    Nguyen, K.T.2
  • 28
    • 84954243971 scopus 로고    scopus 로고
    • Healing on the cloud: Secure cloud architecture for medical wireless sensor networks
    • Feb.
    • A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, "Healing on the cloud: Secure cloud architecture for medical wireless sensor networks, " Future Generat. Comput. Syst., vol. 55, pp. 266-277, Feb. 2016.
    • (2016) Future Generat. Comput. Syst. , vol.55 , pp. 266-277
    • Lounis, A.1    Hadjidj, A.2    Bouabdallah, A.3    Challal, Y.4
  • 29
    • 85029576091 scopus 로고    scopus 로고
    • CCA-secure ABE with outsourced decryption for fog computing
    • Nov.
    • C. Zuo, J. Shao, G. Wei, M. Xie, and M. Ji, "CCA-secure ABE with outsourced decryption for fog computing, " Future Generat. Comput. Syst., Nov. 2016. [Online]. Available: https://doi. org/10. 1016/j. future. 2016. 10. 028
    • (2016) Future Generat. Comput. Syst.
    • Zuo, C.1    Shao, J.2    Wei, G.3    Xie, M.4    Ji, M.5
  • 30
    • 85010635879 scopus 로고    scopus 로고
    • Lightweight distributed secure data management system for health Internet of Things
    • Nov.
    • Y. Yang, X. Zheng, and C. Tang, "Lightweight distributed secure data management system for health Internet of Things, " J. Netw. Comput. Appl., vol. 89, pp. 26-37, Nov. 2016. [Online]. Available: https://doi. org/10. 1016/j. jnca. 2016. 11. 017
    • (2016) J. Netw. Comput. Appl. , vol.89 , pp. 26-37
    • Yang, Y.1    Zheng, X.2    Tang, C.3
  • 31
    • 85007524464 scopus 로고    scopus 로고
    • A multi-cloud based privacy-preserving data publishing scheme for the Internet of Things
    • Los Angeles, CA, USA
    • L. Yang, A. Humayed, and F. Li, "A multi-cloud based privacy-preserving data publishing scheme for the Internet of Things, " in Proc. 32nd Annu. Comput. Secur. Appl. Conf., Los Angeles, CA, USA, 2016, pp. 30-39.
    • (2016) Proc. 32nd Annu. Comput. Secur. Appl. Conf. , pp. 30-39
    • Yang, L.1    Humayed, A.2    Li, F.3
  • 32
    • 85009274837 scopus 로고    scopus 로고
    • An efficient access control scheme with outsourcing capability and attribute update for fog computing
    • Dec.
    • P. Zhang, Z. Chen, J. K. Liu, K. Liang, and H. Liu, "An efficient access control scheme with outsourcing capability and attribute update for fog computing, " Future Generat. Comput. Syst., Dec. 2016. [Online]. Avail-able: https://doi. org/10. 1016/j. future. 2016. 12. 015
    • (2016) Future Generat. Comput. Syst.
    • Zhang, P.1    Chen, Z.2    Liu, J.K.3    Liang, K.4    Liu, H.5
  • 34
    • 84892977444 scopus 로고    scopus 로고
    • EPASS: An expressive attribute-based signature scheme with privacy and an unforgeability guar-antee for the Internet of Things
    • Apr.
    • J. Su, D. Cao, B. Zhao, X. Wang, and I. You, "ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guar-antee for the Internet of Things, " Future Generat. Comput. Syst., vol. 33, no. 2, pp. 11-18, Apr. 2014.
    • (2014) Future Generat. Comput. Syst. , vol.33 , Issue.2 , pp. 11-18
    • Su, J.1    Cao, D.2    Zhao, B.3    Wang, X.4    You, I.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.