1 |
SWESSI D , IDOUDI H . A survey on Internet-of-Things security: threats and emerging countermeasures. Wireless Personal Communications, 2022, 124 (2): 1557- 1592.
|
2 |
MOHAMMADPOOR M , TORABI F . Big data analytics in oil and gas industry: an emerging trend. Petroleum, 2020, 6 (4): 321- 328.
|
3 |
IMTEAJ A , THAKKER U , WANG S Q , et al. A survey on federated learning for resource-constrained IoT devices. IEEE Internet of Things Journal, 2021, 9 (1): 1- 24.
|
4 |
ALZAKHOLI O , HAJI L L , SHUKUR H , et al. Comparison among cloud technologies and cloud performance. Journal of Applied Science and Technology Trends, 2020, 1 (1): 40- 47.
|
5 |
MOHAMMED S M , ABDULKAREEM N M , ZEEBAREE S R M , et al. IoT and cloud computing issues, challenges and opportunities: a review. Qubahan Academic Journal, 2021, 1 (2): 1- 7.
|
6 |
YU Y C , HU L , CHU J F . A secure authentication and key agreement scheme for IoT-based cloud computing environment. Symmetry, 2020, 12 (1): 150.
|
7 |
HUANG X , XIONG H , CHEN J H , et al. Efficient revocable storage attribute-based encryption with arithmetic span programs in cloud-assisted Internet of Things. IEEE Transactions on Cloud Computing, 2021, 11 (2): 1273- 1285.
|
8 |
BELGUITH S , KAANICHE N , HAMMOUDEH M . Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies, 2022, 33 (3): e3667.
|
9 |
BUTT U A , AMIN R , MEHMOOD M , et al. Cloud security threats and solutions: a survey. Wireless Personal Communications, 2023, 128 (1): 387- 413.
|
10 |
LEE C C , CHUNG P S , HWANG M S . A survey on attribute-based encryption schemes of access control in cloud environments. International Journal of Network Security, 2013, 15 (4): 231- 240.
|
11 |
RAVINDER R B, ANIL K A. Survey on access control mechanisms in cloud environments[C]//Proceedings of 2024 International Conference on Emerging eLearning Technologies and Applications. Singapore: Springer Singapore, 2020: 141-149.
|
12 |
GUPTA R , KANUNGO P , DAGDEE N . A survey of state-of-the-art multi-authority attribute based encryption schemes in cloud environment. KSⅡ Transactions on Internet and Information Systems, 2023, 17 (1): 1- 10.
|
13 |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2007: 321-334.
|
14 |
LIU Z H , DING Y Y , YUAN M , et al. Black-box accountable authority CP-ABE scheme for cloud-assisted E-health system. IEEE Systems Journal, 2022, 17 (1): 756- 767.
|
15 |
LEWKO A, WATERS B. Decentralizing attribute-based encryption[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2011: 568-588.
|
16 |
GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security. [S. l. ]: USENIX Association, 2011: 1-10.
|
17 |
CHENG F W , JI S , LAI C . Efficient CP-ABE scheme resistant to key leakage for secure cloud-fog computing. Journal of Internet Technology, 2022, 23 (7): 1461- 1471.
|
18 |
LI X , LIU T , CHEN C Y , et al. A lightweight and verifiable access control scheme with constant size ciphertext in edge-computing-assisted IoT. IEEE Internet of Things Journal, 2022, 9 (19): 19227- 19237.
|
19 |
程小辉, 丁黄婧, 邓昀, 等. 基于边缘计算的多授权属性加密方案. 计算机工程与设计, 2023, 44 (8): 2272- 2279.
|
|
CHENG X H , DING H J , DENG Y , et al. Multi authorization attribute encryption mechanism based on edge computing. Computer Engineering and Design, 2023, 44 (8): 2272- 2279.
|
20 |
ODELU V , DAS A K . Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography. Security and Communication Networks, 2016, 9 (17): 4048- 4059.
|
21 |
DING S , LI C , LI H . A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access, 2018, 6, 27336- 27345.
|
22 |
SETHIA D , SAHU R . Efficient ECC-based CP-ABE scheme with constant-sized key and scalable user revocation. International Journal of Information Security and Privacy, 2022, 16 (1): 1- 19.
|
23 |
严新成, 陈越, 巴阳, 等. 支持用户权限动态变更的可更新属性加密方案. 计算机研究与发展, 2020, 57 (5): 1057- 1069.
|
|
YAN X C , CHEN Y , BA Y , et al. Updatable attribute-based encryption scheme supporting dynamic change of user rights. Journal of Computer Research and Development, 2020, 57 (5): 1057- 1069.
|
24 |
SETHI K , PRADHAN A , BERA P . PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems. Cluster Computing, 2021, 24 (2): 1525- 1550.
|
25 |
DAS S , NAMASUDRA S . MACPABE: multi-authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure. International Journal of Network Management, 2023, 33 (3): e2200.
|
26 |
董江涛, 闫沛文, 杜瑞忠. 雾计算中基于无配对CP-ABE可验证的访问控制方案. 通信学报, 2021, 42 (8): 139- 150.
|
|
DONG J T , YAN P W , DU R Z . Verifiable access control scheme based on unpaired CP-ABE in fog computing. Journal on Communications, 2021, 42 (8): 139- 150.
|