[1] ZHANG Yuqing,WANG Xiaofei,LIU Xuefei,et al.Survey on cloud computing security[J].Journal of Software,2016,27(6):1328-1348.(in Chinese)张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348. [2] MUKHERJEE M,SHU L,WANG D.Survey of fog computing:fundamental,network applications,and research challenges[J].IEEE Communications Surveys and Tutorials,2018,20(3):1826-1857. [3] BITTENCOURT L F,DIAZ-MONTES J,BUYYA R,et al.Mobility-aware application scheduling in fog computing[J].IEEE Cloud Computing,2017,4(2):26-35. [4] SHI Weisong,ZHANG Xingzhou,WANG Yifan,et al.Edge computing:state-of-the-art and future directions[J].Journal of Computer Research and Development,2019,56(1):69-89.(in Chinese)施巍松,张星洲,王一帆,等.边缘计算:现状与展望[J].计算机研究与发展,2019,56(1):69-89. [5] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques.Aarhus,Denmark:[s.n.],2005:458-473. [6] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-97. [7] YU Shucheng,REN Kui,LOU Wenjing,et al.Defending against key abuse attacks in KP-ABE enabled broadcast systems[C]//Proceedings of the 5th International Conference on Security and Privacy in Communication Networks.Berlin,Germany:Springer,2009:312-329. [8] LI Jin,WANG Qian,WANG Cong,et al.Enhancing attribute-based encryption with attribute hierarchy[J].Mobile Networks and Applications,2011,16:553-561. [9] ALRAWAIS A,ALHOTHAILY A,HU C,et al.An attribute-based encryption scheme to secure fog communications[J].IEEE Access,2017,5:9131-9138. [10] TU S,HUANG Y,MAGURAWALAGE C,et al.Access control system based cloudlet and ABE for mobile cloud computing[J].Journal of Internet Technology,2016,17(7):1443-1451. [11] ATTRAPADUNG N,IMAI H.Attribute-based encryption supporting direct/indirect revocation modes[C]//Proceedings of the 12th IMA International Conference on Cryptography and Coding.Cirencester,UK:[s.n.],2009:291-305. [12] YU Shucheng,WANG Cong,REN Kui,et al.Attribute based data sharing with attribute revocation[C]//Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2010:261-270. [13] HUR J,NOH D K.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221. [14] LIU Songzhu,PENG Jiapeng.An outsourced attribute-based encryption scheme supporting attribute revocation[J].Computer Engineering,2017,43(10):109-114.(in Chinese)刘竹松,彭佳鹏.一种支持属性撤销的外包属性加密方案[J].计算机工程,2017,43(10):109-114. [15] GREEN M,HOHENBERGER S,WATERS B.Outsourcing the decryption of ABE ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security.Berkeley,USA:[s.n.],2011:151-163. [16] ZHOU Zhibin,HUANG Dijiang.Efficient and secure data storage operations for mobile cloud computing[C]//Proceedings of International Conference on Network & Service Management.Las Vegas,USA:[s.n.],2012:123-132. [17] MAO Xiangping,LAI Junzuo,MEI Qixiang,et al.Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions on Dependable and Secure Computing,2016,13(5):533-546. [18] ZUO Cong,SHAO Jun,WEI Guiyi,et al.CCA-secure ABE with outsourced decryption for fog computing[J].Future Generation Computer Systems,2016,78(2):730-738. [19] FANG Xuefeng,WANG Xiaoming.Outsourced encryption and decryption CP-ABE scheme with user revocation[J].Computer Engineering,2016,42(12):124-128,132.(in Chinese)方雪锋,王晓明.可撤销用户的外包加解密CP-ABE方案[J].计算机工程,2016,42(12):124-128,132. |