2022
DOI: 10.1109/jsyst.2021.3125455
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Unbounded Fully Attribute Hiding Inner Product Encryption in Cloud-Aided WBANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 35 publications
0
5
0
Order By: Relevance
“…These massive amounts of health data collected by IoT wearable devices are required to be safely transferred and stored in CSS [7,8]. Thus, it can allow the authorized relevant parties (such as caretakers or doctors) to safely access these sensitive and privacy data [14,15] and apply different analytical techniques However, EC bring two new problems, namely data repair (DR) and data update (DU). In DU, since each parity block is a linear combination of multiple data blocks, once the data block is updated, the relevant parity blocks must also be updated to achieve data consistency.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These massive amounts of health data collected by IoT wearable devices are required to be safely transferred and stored in CSS [7,8]. Thus, it can allow the authorized relevant parties (such as caretakers or doctors) to safely access these sensitive and privacy data [14,15] and apply different analytical techniques However, EC bring two new problems, namely data repair (DR) and data update (DU). In DU, since each parity block is a linear combination of multiple data blocks, once the data block is updated, the relevant parity blocks must also be updated to achieve data consistency.…”
Section: Introductionmentioning
confidence: 99%
“…These massive amounts of health data collected by IoT wearable devices are required to be safely transferred and stored in CSS[7,8]. Thus, it can allow the authorized relevant parties (such as caretakers or doctors) to safely access these sensitive and privacy data[14,15] and apply different analytical techniques…”
mentioning
confidence: 99%
“…Currently, ABE is commonly used for secure access control of data on the cloud. [4][5][6][7] Although the ABE scheme is used to implement fine-grained access control, its computational overhead is not low, and these calculations are inefficient for an IoT system with limited storage and computational capacity, and the real-time requirements of data response for Internet of Vehicles are extremely strict. In addition, the characteristics of the Internet of Vehicle devices lead to their vulnerability to attacks and key leakage, so the handling of the keys after leakage is also an urgent issue to be dealt with.…”
Section: Introductionmentioning
confidence: 99%
“…Currently, there have been many solutions to apply ABE to data sharing in the IoT. Currently, ABE is commonly used for secure access control of data on the cloud 4‐7 …”
Section: Introductionmentioning
confidence: 99%
“…Therefore, by adopting IPE, one can realize multiple kinds of flexible access control using only a single cryptographic primitive. Recently, more applications for IPE have been developed, e.g., privacy-preserving video streaming [21], access control for WBAN [22], secure keyword searching [23] and outsourced data integration [24]. It shows the possibility for the application of IPE in various environments.…”
Section: Introductionmentioning
confidence: 99%