In order to solve the security problem of the data access between edge nodes in edge computing, in view of the distributed characteristics of edge computing, this paper combines edge computing and complex cryptographic computing environment, and proposes an attribute-based encryption in edge computing environment The access control method ensures the encryption of data communication between edge nodes and at the same time realizes the fine-grained access control function between edge nodes that can be accurate to the attribute level This solution can flexibly control data access, the edge node sets the access control strategy, and proposes the access control to the data access of other edge nodes
Cloud computing is a top emerging technology in the IT industry. It is a computing mode, which provi...
To prevent data breaches via removable storage media, the way to enhance the access control capabili...
In several distributed systems a user should only be able to access data if a user posses a certain ...
In order to solve the security problem of the data access between edge nodes in edge computing, in v...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
With the assistance of edge computing which reduces the heavy burden of the cloud center server by u...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data to edge node...
By moving computing resources close to where they are needed (i.e., the network edges), edge computi...
Abstract An access control system is needed to ensure only authorized users can access a sensitive r...
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can...
[[abstract]]In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attri...
The cloud computing paradigm provides numerous tempting advantages, enabling users to store and shar...
International audienceIn several distributed systems a user should only be able to access data if a ...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Cloud computing is a top emerging technology in the IT industry. It is a computing mode, which provi...
To prevent data breaches via removable storage media, the way to enhance the access control capabili...
In several distributed systems a user should only be able to access data if a user posses a certain ...
In order to solve the security problem of the data access between edge nodes in edge computing, in v...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
With the assistance of edge computing which reduces the heavy burden of the cloud center server by u...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data to edge node...
By moving computing resources close to where they are needed (i.e., the network edges), edge computi...
Abstract An access control system is needed to ensure only authorized users can access a sensitive r...
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can...
[[abstract]]In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attri...
The cloud computing paradigm provides numerous tempting advantages, enabling users to store and shar...
International audienceIn several distributed systems a user should only be able to access data if a ...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Cloud computing is a top emerging technology in the IT industry. It is a computing mode, which provi...
To prevent data breaches via removable storage media, the way to enhance the access control capabili...
In several distributed systems a user should only be able to access data if a user posses a certain ...