2022
DOI: 10.1186/s13638-021-02072-5
|View full text |Cite
|
Sign up to set email alerts
|

Enabling efficient traceable and revocable time-based data sharing in smart city

Abstract: With the assistance of emerging techniques, such as cloud computing, fog computing and Internet of Things (IoT), smart city is developing rapidly into a novel and well-accepted service pattern these days. The trend also facilitates numerous relevant applications, e.g., smart health care, smart office, smart campus, etc., and drives the urgent demand for data sharing. However, this brings many concerns on data security as there is more private and sensitive information contained in the data of smart city applic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 47 publications
0
4
0
Order By: Relevance
“…Zhang [21] proposed a data privacy security method that supported monotonous and partially hidden access policies and large-scale attribute spaces by hiding the attribute values of access policies. Used hierarchical identity-based encryption technology to set the user key validity period, so as to achieve time-based fine-grained access control and user privacy protection of access policies.…”
Section: Security Protection Technologymentioning
confidence: 99%
“…Zhang [21] proposed a data privacy security method that supported monotonous and partially hidden access policies and large-scale attribute spaces by hiding the attribute values of access policies. Used hierarchical identity-based encryption technology to set the user key validity period, so as to achieve time-based fine-grained access control and user privacy protection of access policies.…”
Section: Security Protection Technologymentioning
confidence: 99%
“…Nevertheless, this scheme is only suitable for static scenarios where each data replica is checked one by one, so it incurs much additional computation. Besides, there are many research schemes [13][14][15][16][17] based on authentication data structures such as Merkle Hash Tree (MHT) and Index-Hash Table (IHT), and they utilize homomorphic signatures for simultaneous verification of multi-copy outsourced data and dynamic update verification. To further enhance the efficiency and reduce the burden of certificate management, researchers have also proposed an identity-based scheme for multi-copy data integrity verification by adopting identity signature technology [18,19].…”
Section: Traditional Cloud Storage Multiple-replica Integrity Verific...mentioning
confidence: 99%
“…To resist the collusion attack between the revoked users and the malicious users, Zhang et al [ 34 ] set a group manager to assign a certificate for each user and embed the certificate into the user’s secret key. While implementing revocable user management, the scheme TR-TABE [ 35 ] can achieve white-box traceability without maintaining a user list.…”
Section: Related Workmentioning
confidence: 99%