Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    A Blockchain and CP-ABE Based Access Control Scheme with Fine-Grained Revocation of Attributes in Cloud Health

    Ye Lu1,*, Tao Feng1, Chunyan Liu2, Wenbo Zhang3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2787-2811, 2024, DOI:10.32604/cmc.2023.046106

    Abstract The Access control scheme is an effective method to protect user data privacy. The access control scheme based on blockchain and ciphertext policy attribute encryption (CP–ABE) can solve the problems of single—point of failure and lack of trust in the centralized system. However, it also brings new problems to the health information in the cloud storage environment, such as attribute leakage, low consensus efficiency, complex permission updates, and so on. This paper proposes an access control scheme with fine-grained attribute revocation, keyword search, and traceability of the attribute private key distribution process. Blockchain technology tracks the authorization of attribute private… More >

  • Open Access

    ARTICLE

    Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

    Zaid Abdulsalam Ibrahim1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 939-956, 2023, DOI:10.32604/cmc.2023.035798

    Abstract Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment with a Hidden Hierarchy Ciphertext-Policy… More >

  • Open Access

    ARTICLE

    Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1079-1092, 2023, DOI:10.32604/csse.2023.033961

    Abstract The cloud allows clients to store and share data. Depending on the user’s needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the… More >

  • Open Access

    ARTICLE

    An Improved Pairing-Free Ciphertext Policy Framework for IoT

    M. Amirthavalli*, S. Chithra, R. Yugha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3079-3095, 2023, DOI:10.32604/csse.2023.032486

    Abstract Internet of Things (IoT) enables devices to get connected to the internet. Once they are connected, they behave as smart devices thereby releasing sensitive data periodically. There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices. The objective of this research work is to create a framework encompassing Ciphertext policy Attribute-based Encryption scheme using block… More >

  • Open Access

    ARTICLE

    Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment

    Pooja Dhiman1, Santosh Kumar Henge1, Sartaj Singh1, Avinash Kaur2, Parminder Singh2,3, Mustapha Hadabou3,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3297-3313, 2023, DOI:10.32604/cmc.2023.030558

    Abstract This research paper puts emphasis on using cloud computing with Blockchain (BC) to improve the security and privacy in a cloud. The security of data is not guaranteed as there is always a risk of leakage of users’ data. Blockchain can be used in a multi-tenant cloud environment (MTCE) to improve the security of data, as it is a decentralized approach. Data is saved in unaltered form. Also, Blockchain is not owned by a single organization. The encryption process can be done using a Homomorphic encryption (HE) algorithm along with hashing technique, hereby allowing computations on encrypted data without the… More >

  • Open Access

    ARTICLE

    Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3801-3813, 2023, DOI:10.32604/iasc.2023.032267

    Abstract Due to the mobility of users in an organization, inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption (CP-ABE). By considering this challenge; we focus to present dynamic time and location information in CP-ABE with multi-authorization. At first, along with the set of attributes of the users, their corresponding location is also embedded. Geohash is used to encode the latitude and longitude of the user’s position. Then, decrypt time period and access time period of users are defined using the new time tree (NTT) structure. The NTT sets the encrypted duration of… More >

Displaying 1-10 on page 1 of 6. Per Page