|
|
|
Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao and Mingrui Zhang
Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an h...
ver más
|
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Vangelis Malamas, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester and Dimitris Glynos
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open...
ver más
|
|
|
|
|
|
|
Saad Inshi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today?s i...
ver más
|
|
|
|
|
|
|
Youcef Fouzar, Ahmed Lakhssassi and Ramakrishna Mundugar
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content prov...
ver más
|
|
|
|
|
|
|
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce...
ver más
|
|
|
|
|
|
|
Siti Dhalila Mohd Satar, Masnida Hussin, Zurina Mohd Hanapi and Mohamad Afendee Mohamed
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data acces...
ver más
|
|
|
|
|
|
|
Zhijun Wu, Yun Zhang and Enzhong Xu
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Dat...
ver más
|
|
|
|
|
|
|
Teh-Lu Liao, Hong-Ru Lin, Pei-Yen Wan and Jun-Juh Yan
In recent years, Internet of Things (IoT) has developed rapidly and been widely used in industry, agriculture, e-health, smart cities, and families. As the total amount of data transmission will increase dramatically, security will become a very importan...
ver más
|
|
|
|
|
|
|
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono
Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w...
ver más
|
|
|
|