[1] |
贾维嘉, 周小杰 . 雾计算的概念、相关研究与应用[J]. 通信学报, 2018,39(5): 153-165.
|
|
JIA W J , ZHOU X J . Concepts,issues,and applications of fog computing[J]. Journal on Communications, 2018,39(5): 153-165.
|
[2] |
GUO R , ZHUANG C Y , SHI H X ,et al. A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing[J]. International Journal of Distributed Sensor Networks, 2020,16(2): 155014772090679.
|
[3] |
JIANG J F , TANG L Y , GU K ,et al. Secure computing resource allocation framework for open fog computing[J]. The Computer Journal, 2020,63(4): 567-592.
|
[4] |
SHAHID M H , HAMEED A R , ISLAM S U ,et al. Energy and delay efficient fog computing using caching mechanism[J]. Computer Communications, 2020,154: 534-541.
|
[5] |
DESIKAN K E S , KOTAGI V J , MURTHY C S R . Topology control in fog computing enabled IoT networks for smart cities[J]. Computer Networks, 2020,176:107270.
|
[6] |
VILELA P H , RODRIGUES J J P C , RIGHI R D R ,et al. Looking at fog computing for E-health through the lens of deployment challenges and applications[J]. Sensors, 2020,20(9): 2553.
|
[7] |
FERRAIOLO D , CUGINI J , KUHN D R . Role-based access control (RBAC):features and motivations[C]// Proceedings of 11th Annual Computer Security Application Conference. Piscataway:IEEE Press, 1995: 241-248.
|
[8] |
ZHANG P Y , ZHOU M C , FORTINO G . Security and trust issues in fog computing:a survey[J]. Future Generation Computer Systems, 2018,88: 16-27.
|
[9] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// 2007 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2007: 321-334.
|
[10] |
WANG H , ZHENG Z H , WU L . New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems[J]. Journal of High Speed Networks, 2016,22(2): 153-167.
|
[11] |
LIANG K T , SUSILO W . Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9): 1981-1992.
|
[12] |
LEWKO A , WATERS B . Decentralizing attribute-based encryption[C]// Advances in Cryptology – EUROCRYPT 2011. Berlin:Springer, 2011: 568-588.
|
[13] |
HORVATH M , . Attribute-based encryption optimized for cloud computing[C]// Theory and Practice of Computer Science. Berlin:Springer, 2015,DOI:10.1007/978-3-662-46078-8_47.
|
[14] |
HUR J . Improving security and efficiency in attribute-based data sharing[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(10): 2271-2282.
|
[15] |
LIANG K T , SUSILO W . Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9): 1981-1992.
|
[16] |
WANG S L , LIANG K T , LIU J K ,et al. Attribute-based data sharing scheme revisited in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2016,11(8): 1661-1673.
|
[17] |
LI J G , WANG Y , ZHANG Y C ,et al. Full verifiability for outsourced decryption in attribute based encryption[J]. IEEE Transactions on Services Computing, 2020,13(3): 478-487.
|
[18] |
ZHANG K , LI H , MA J F ,et al. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability[J]. Science China Information Sciences, 2017,61(3): 1-13.
|
[19] |
FREEMAN D , SCOTT M , TESKE E . A taxonomy of pairing-friendly elliptic curves[J]. Journal of Cryptology, 2010,23(2): 224-280.
|
[20] |
SCOTT M , . On the efficient implementation of pairing-based protocols[C]// Cryptography and Coding. Berlin:Springer, 2011: 296-308.
|
[21] |
PONTIE S , MAISTRI P , LEVEUGLE R . Dummy operations in scalar multiplication over elliptic curves:a tradeoff between security and performance[J]. Microprocessors & Microsystems, 2016,47: 23-36.
|
[22] |
CHEVALLIER-MAMES B , CORON J S , MCCULLAGH N ,et al. Secure delegation of elliptic-curve pairing[C]// Lecture Notes in Computer Science. Berlin:Springer, 2010: 24-35.
|
[23] |
CHEN X F , SUSILO W , LI J ,et al. Efficient algorithms for secure outsourcing of bilinear pairings[J]. Theoretical Computer Science, 2015,562: 112-121.
|
[24] |
ODELU V , DAS A K . Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography[J]. Security and Communication Networks, 2016,9(17): 4048-4059.
|
[25] |
MAESA D D F , MORI P , RICCI L . Blockchain based access control[C]// Distributed Applications and Interoperable Systems. Berlin:Springer, 2017: 206-220.
|
[26] |
DAGHER G G , MOHLER J , MILOJKOVIC M ,et al. Ancile:privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology[J]. Sustainable Cities and Society, 2018,39: 283-297.
|
[27] |
DORRI A , KANHERE S S , JURDAK R ,et al. Blockchain for IoT security and privacy:the case study of a smart home[C]// 2017 IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway:IEEE Press, 2017: 618-623.
|
[28] |
谢绒娜, 李晖, 史国振 ,等. 基于区块链的可溯源访问控制机制[J]. 通信学报, 2020,41(12): 82-93.
|
|
XIE R N , LI H , SHI G Z ,et al. Blockchain-based access control mechanism for data traceability[J]. Journal on Communications, 2020,41(12): 82-93.
|
[29] |
应作斌, 斯元平, 马建峰 ,等. 基于区块链的分布式EHR细粒度可追溯方案[J]. 通信学报, 2021,42(5): 205-215.
|
|
YING Z B , SI Y P , MA J F ,et al. Blockchain-based distributed EHR fine-grained traceability scheme[J]. Journal on Communications, 2021,42(5): 205-215.
|