With the assistance of edge computing which reduces the heavy burden of the cloud center server by using the network edge servers, the Internet of Things (IoTs) architectures enable low latency for real-time devices and applications. However, there still exist security challenges on data access control for the IoT. Multiauthority attribute-based encryption (MA-ABE) is a promising technique to achieve access control over encrypted data in cross-domain applications. Based on the characteristics and technical requirements of the IoT, we propose an efficient fine-grained revocable large universe multiauthority access control scheme. In the proposed scheme, the most expensive encryption operations have been executed in the user’s initialization ...
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can...
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynam...
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data to edge node...
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mo...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
Cloud-assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their data...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
Ciphertext policy attribute-based encryption (CP-ABE) is an encryption mechanism that can provide fi...
Current activities in the Internet of Things research area are devoting many efforts to the definiti...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Th...
The Internet of Things (IoT) is a new technology that has drawn interest from both industry and acad...
The Internet of Things technology has been used in a wide range of fields, ranging from industrial a...
Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), w...
The Internet of Things (IoT) is an information service paradigm based on the integration of smart ob...
© 2002-2012 IEEE. Nowadays, the development of the Internet of Things (IoT) has received much attent...
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can...
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynam...
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data to edge node...
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mo...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
Cloud-assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their data...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
Ciphertext policy attribute-based encryption (CP-ABE) is an encryption mechanism that can provide fi...
Current activities in the Internet of Things research area are devoting many efforts to the definiti...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Th...
The Internet of Things (IoT) is a new technology that has drawn interest from both industry and acad...
The Internet of Things technology has been used in a wide range of fields, ranging from industrial a...
Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), w...
The Internet of Things (IoT) is an information service paradigm based on the integration of smart ob...
© 2002-2012 IEEE. Nowadays, the development of the Internet of Things (IoT) has received much attent...
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can...
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynam...
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data to edge node...