2017
DOI: 10.1109/access.2017.2705076
|View full text |Cite
|
Sign up to set email alerts
|

An Attribute-Based Encryption Scheme to Secure Fog Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 136 publications
(54 citation statements)
references
References 15 publications
0
54
0
Order By: Relevance
“…Arwa et al [1] proposed an attribute-based encryption scheme to maintain fog communications security. Designed to provide authentic, confidential communications among a group of fog nodes, it made use of a key-exchange protocol based on the CP-ABE algorithm.…”
Section: Communication Among Fog Nodesmentioning
confidence: 99%
“…Arwa et al [1] proposed an attribute-based encryption scheme to maintain fog communications security. Designed to provide authentic, confidential communications among a group of fog nodes, it made use of a key-exchange protocol based on the CP-ABE algorithm.…”
Section: Communication Among Fog Nodesmentioning
confidence: 99%
“…However, the computation cost during encryption process was high. An efficient key exchange protocol [11] was proposed based on the CP-ABE technique to establish the secure communications among the users. This protocol was mainly proposed for encrypted key exchange based on CP-ABE that combines encryption and signature for achieving a fine-grained data access control, confidentiality, authentication and verifiability.…”
Section: Literature Surveymentioning
confidence: 99%
“…Second, it uses long-term keys that would not be updated or revoked. Authors in [19] propose a key exchange protocol based on policy-attribute encryption to provide confidentiality, authentication and access control to fog servers. In their architecture, a centralized key generator server is responsible for distributing keys to all entities, while cloud is responsible for defining access control policies.…”
Section: Related Workmentioning
confidence: 99%