[1] ZHANG Yuqing,WANG Xiaofei,LIU Xuefeng,et al.Survey on cloud computing security[J].Journal of Software,2016,27(6):1328-1348.(in Chinese)张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348. [2] WATERS B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography.New York,USA:ACM Press,2011:53-70. [3] BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:321-334. [4] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98. [5] QIN Baodong,ZHENG Dong.Generic approach to outsource the decryption of attribute-based encryption in cloud computing[J].IEEE Access,2019,7:42331-42342. [6] FU Junsong,WANG Na.A practical attribute-based document collection hierarchical encryption scheme in cloud computing[J].IEEE Access,2019,7:36218-36232. [7] WANG Shangping,ZHANG Duo,ZHANG Yaling,et al.Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage[J].IEEE Access,2018,6:30444-30457. [8] LEWKO A B,WATERS B.Decentralizing attribute-based encryption[C]//Proceedings of EUROCRYPT'11.Berlin,Germany:Springer,2011:568-588. [9] YANG Kan,JIA Xiaohua,REN Kui,et al.DAC-MACS:effective data access control for multi-authority cloud storage systems[J].IEEE Transactions on Information Forensics and Security,2013,8(11):1790-1801. [10] BELGUITH S,KAANICHE N,LAURENT M,et al.PHOABE:securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT[J].Computer Networks,2018,133:141-156. [11] YAN Xixi,NI Hao,LIU Yuan,et al.Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR[J].Computer Science and Information Systems,2019,16(3):831-847. [12] ZHANG Jiale,CHEN Bing,HU Feng,et al.Survey on data security and privacy-preserving for the research of edge computing[J].Journal on Communications,2018,39(3):1-21. [13] GREEN M,HOHENBERGER S,WATERS B.Outsourcing the decryption of ABE ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security.New York,USA:ACM Press,2011:1-34. [14] LI Wenmin,LI Xuelei,WEN Qiaoyan,et al.Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system[J].Journal of Computer Science and Technology,2017,32(5):974-990. [15] ZHANG P,CHEN Z,LIU J K,et al.An efficient access control scheme with outsourcing capability and attribute update for fog computing[J].Future Generation Computer Systems,2018,78:753-762. [16] ZUO Cong,SHAO Jun,WEI Guiyi,et al.CCA-secure ABE with outsourced decryption for fog computing[J].Future Generation Computer Systems,2018,78:730-738. [17] HONG Jianan,XUE Kaiping,LI Wei,et al.TAFC:time and attribute factors combined access control for time-sensitive data in public cloud[C]//Proceedings of 2015 IEEE Global Communications Conference.Washington D.C.,USA:IEEE Press,2015:6-14. [18] YANG Kan,LIU Zhen,JIA Xiaohua,et al.Time-domain attribute-based access control for cloud-based video content sharing:a cryptographic approach[J].IEEE Transactions on Multimedia,2016,18(5):940-950. [19] ANDROULAKI E,SORIENTE C,MALISA L,et al.Enforcing location and time-based access control on cloud-stored data[C]//Proceedings of the 34th International Conference on Distributed Computing Systems.Washington D.C.,USA:IEEE Press,2014:637-648. [20] SHAO Jun,LU Rongxing,LIN Xiaodong.FINE:a fine-grained privacy-preserving location-based service framework for mobile devices[C]//Proceedings of IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2014:1-7. [21] XUE Yingjie,HONG Jianan,LI Wei,et al.LABAC:a location-aware attribute-based access control scheme for cloud storage[C]//Proceedings of IEEE Global Communications Conference.Washington D.C.,USA:IEEE Press,2016:614-623. |