[1] |
HABIBI P , FARHOUDI M , KAZEMIAN S ,et al. Fog computing:a comprehensive architectural survey[J]. IEEE Access, 2020,8: 69105-69133.
|
[2] |
GUO R , ZHUANG C , SHI H ,et al. A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing[J]. International Journal of Distributed Sensor Networks, 2020,DOI:10.1177/1550147720906796.
|
[3] |
JIANG J F , TANG L Y , GU K ,et al. Secure computing resource allocation framework for open fog computing[J]. The Computer Journal, 2020,63(4): 567-592.
|
[4] |
SHAHID M H , HAMEED A R , ISLAM S U ,et al. Energy and delay efficient fog computing using caching mechanism[J]. Computer Communications, 2020,154: 534-541.
|
[5] |
DESIKAN K E S , KOTAGI V J , MURTHY C S R . Topology control in fog computing enabled IoT networks for smart cities[J]. Computer Networks, 2020,167: 107270.
|
[6] |
VILELA P H , RODRIGUES J J P C , RIGHI R R ,et al. Looking at fog computing for E-health through the lens of deployment challenges and applications[J]. Sensors, 2020,20(9): 2553.
|
|
李琦, 朱洪波, 熊金波 ,等. mHealth中可追踪多授权机构基于属性的访问控制方案[J]. 通信学报, 2018,39(6): 1-10.
|
|
LI Q , ZHONG H B , XIONG J B ,et al. Multi-authority attribute-based access control system in mHealth with traceability[J]. Journal on Communications, 2018,39(6): 1-10.
|
[7] |
ALEISA M A , ABUHUSSEIN A , SHELDON F T . Access control in fog computing:challenges and research agenda[J]. IEEE Access, 2020,8: 83986-83999.
|
[8] |
ZHANG P Y , ZHOU M C , FORTINO G . Security and trust issues in fog computing:a survey[J]. Future Generation Computer Systems, 2018,88: 16-27.
|
[9] |
BETHENCOURT J , AMIT S , WATERS B . Ciphertext-policy attribute based encryption[C]// 2007 IEEE Symposium on Security & Privacy. Piscataway:IEEE Press, 2007: 321-334.
|
[10] |
WANG H , ZHENG Z H , WU L ,et al. New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems[J]. Journal of High Speed Networks, 2016,22(2): 153-167.
|
[11] |
LIANG K T , SUSILO W . Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9): 1981-1992.
|
[12] |
IBRAIMI L , TANG Q , HARTEL P H . Efficient and provable secure ciphertext-policy attribute-based encryption schemes lecture notes in computer science[C]// 2009 International Conference on Information Security Practice and Experience(ISPEC). Berlin:Springer, 2009: 1-12.
|
[13] |
WANG H Q , HE D B , HAN J G . VOD-ADAC:anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud[J]. IEEE Transactions on Services Computing, 2017,13(3): 572-583.
|
[14] |
WANG H Q , HE D B , YU J ,et al. Incentive and unconditionally anonymous identity-based public provable data possession[J]. IEEE Transactions on Services Computing, 2016,12(5): 824-835.
|
[15] |
JIN Y , TIAN C , HE H ,et al. A secure and lightweight data access control scheme for mobile cloud computing[C]// 2015 IEEE Fifth International Conference on Big Data and Cloud Computing. Piscataway:IEEE Press, 2015: 172-179.
|
[16] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[C]// Proceedings of the 20th USENIX Conference on Security. Berkeley:USENIX Association, 2011: 523-538.
|
[17] |
MAO X P , LAI J Z , MEI Q X ,et al. Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(5): 533-546.
|
[18] |
KUMAR P P , KUMAR P S , ALPHONSE P J A . A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2019,10: 2693-2707.
|
[19] |
KIBIWOTT K P , FENGLI Z , ANYEMBE O A ,et al. Secure cloudlet-based ehealth big data system with fine-grained access control and outsourcing decryption from ABE[J]. International Journal of Network Security, 2018,20(6): 1149-1162.
|
[20] |
AL-DAHHAN R R , SHI Q , LEE G M ,et al. Revocable,decentralized multi-authority access control system[C]// 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion. Piscataway:IEEE Press, 2018: 220-225.
|
[21] |
ZHANG P , CHEN Z , LIU J K ,et al. An efficient access control scheme with outsourcing capability and attribute update for fog computing[J]. Future Generation Computer Systems, 2018,78(2): 753-762.
|
[22] |
CHEN N , GERLA M , HUANG D ,et al. Secure,selective group broadcast in vehicular networks using dynamic attribute based encryption[C]// 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop. Piscataway:IEEE Press, 2010,DOI:10.1109/ MEDHOCNET.2010.5546877.
|
[23] |
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7): 1214-1221.
|
[24] |
LIU Z H , DUAN S H , ZHOU P L ,et al. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme[J]. Future Generation Computer Systems, 2019,93: 903-913.
|
[25] |
张凯, 马建峰, 李辉 ,等. 支持高效撤销的多机构属性加密方案[J]. 通信学报, 2017,38(3): 83-91.
|
|
ZHANG K , MA J F , LI H ,et al. Multi-authority attribute-based encryption with efficient revocation[J]. Journal on Communications, 2017,38(3): 83-91.
|