2019
DOI: 10.1155/2019/3249726
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud

Abstract: Due to the rapid development of new technologies such as cloud computing, Internet of Things (IoT), and mobile Internet, the data volumes are exploding. Particularly, in the industrial field, a large amount of data is generated every day. How to manage and use industrial Big Data primely is a thorny challenge for every industrial enterprise manager. As an emerging form of service, cloud computing technology provides a good solution. It receives more and more attention and support due to its flexible configurat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 26 publications
0
25
0
Order By: Relevance
“…Meanwhile, the permutation of the EEG signals will be taken into consideration. It is notable that the proposed approach relates to the following areas including network security [44]- [58], optimization [59]- [65], graphics [66]- [71], recommendation system [72]- [74], multimedia [75]- [82], automation control [83]- [87], networking [88]- [101], classification [102]- [106], image fusion [107], [108], image retrieval [109]- [114], and simulation [115]- [117]. WEIKUAN JIA is currently an Associate Professor with Shandong Normal University.…”
Section: Discussionmentioning
confidence: 99%
“…Meanwhile, the permutation of the EEG signals will be taken into consideration. It is notable that the proposed approach relates to the following areas including network security [44]- [58], optimization [59]- [65], graphics [66]- [71], recommendation system [72]- [74], multimedia [75]- [82], automation control [83]- [87], networking [88]- [101], classification [102]- [106], image fusion [107], [108], image retrieval [109]- [114], and simulation [115]- [117]. WEIKUAN JIA is currently an Associate Professor with Shandong Normal University.…”
Section: Discussionmentioning
confidence: 99%
“…In traditional CP-ABE schemes, there are three types of entities: key generation center (KGC), the encryptor (data owner), the decryptor (data users) [46] [47]. KGC generates the private key to configure the system and generates/distributes the secret key for each data user according to their attributes.…”
Section: A Attribute-based Encryption (Abe)mentioning
confidence: 99%
“…OF MOBILE CLOUD COMPUTING [8]In the Mobile Cloud Computing environment, we have breaches of security challenges at three layers as follows:…”
Section: Proposed Model For a Different Levelmentioning
confidence: 99%