Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid |
Li, Hongwei
(School of Computer Science & Engineering, University of Electronic Schience and Technology of China Chengdu)
Liu, Dongxiao (School of Computer Science & Engineering, University of Electronic Schience and Technology of China Chengdu) Alharbi, Khalid (Faculty of Business and Information Technology, University of Ontario Institute of Technology) Zhang, Shenmin (School of Computer Science & Engineering, University of Electronic Schience and Technology of China Chengdu) Lin, Xiaodong (Faculty of Business and Information Technology, University of Ontario Institute of Technology) |
1 | S. Yu, C. Wang, K. Ren and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. of INFOCOM, pp. 1-9, 2014. Article (CrossRef Link) |
2 | J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” in IEEE Conference on Communications and Network Security (CNS), pp. 145-153, 2013. Article (CrossRef Link) |
3 | H. Li, Y. Dai, L. Tian, H. Yang, "Identity-Based Authentication for Cloud Computing," Lecture Notes of Computer Science (LNCS), vol. 5931, 157-166, 2009. Article (CrossRef Link) |
4 | C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. of INFOCOM, pp. 1-9, 2010. Article (CrossRef Link) |
5 | A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in Proc. of EUROCRYPT, pp. 568-588, 2011. Article (CrossRef Link) |
6 | D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology-CRYPTO, Springer, pp. 213-229, 2001. Article (CrossRef Link) |
7 | B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in Proc. of PKC, Springer, pp. 53-70, 2011. Article (CrossRef Link) |
8 | K. Yang, X. Jia, K. Ren, R. Xie and L. Huang, “Enabling efficient access control with dynamic policy updating for big data in the cloud,” in Proc. of INFOCOM, pp. 2013-2021, 2014. Article (CrossRef Link) |
9 | “Miracl cryptographic sdk,” Article (CrossRef Link) |
10 | A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology–EUROCRYPT, Springer, pp. 457–473, 2005. Article (CrossRef Link) |
11 | V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. of the 13th ACM conference on Computer and communications security. ACM, pp. 89-98, 2006. Article (CrossRef Link) |
12 | Z. M. Fadlullah, N. Kato, R. Lu, X. Shen, Y. Nozaki, “Toward secure targeted broadcast in smart grids,” IEEE Communications Magazine, vol. 50, no. 5, pp. 150-156, 2012. Article (CrossRef Link) DOI |
13 | S. Ruj and A. Nayak, “A decentralized security framework for data aggregation and access control in smart grids,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 196-205, 2013. Article (CrossRef Link) DOI |
14 | Y. Yang, H. Li, W. Liu, H. Yang, and M. Wen, “Secure Dynamic Searchable Symmetric Encryption with Constant Document Update Cost,” in Proc. of GLOBECOM, pp. 775-780, 2014. Article (CrossRef Link) |
15 | H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. S. Shen, “Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data,” IEEE Transactions on Dependable and Secure Computing, 2015. Article (CrossRef Link) |
16 | H. Li, D. Liu, Y. Dai,T. H. Luan, and X. S. Shen, “Enabling Efficient Multi-keyword Ranked Search over Encrypted Cloud Data through Blind Storage,” IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1, pp. 127-138, 2015. Article (CrossRef Link) DOI |
17 | D. Liu, H. Li, Y. Yang, and H. Yang, “Achieving Multi-Authority Access Control with Efficient Attribute Revocation in Smart Grid,” in Proc. of ICC, pp. 634-639, 2014. Article (CrossRef Link) |
18 | H. Li, X. Lin, H. Hang, X. Liang, R. Lu, X. Shen, “Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no.8, pp. 2053 - 2064, 2014. Article (CrossRef Link) DOI |
19 | H. Li, Y. Yang, M. Wen, H. Luo, and R. Lu, “EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market,” KSII Transactions on Internet and Information Systems, vol. 8, no. 11, pp. 3937- 3954, 2014. Article (CrossRef Link) DOI |
20 | Y. Yang, H. Li, M. Wen, H. Luo, and R. Lu, “Achieving Ranked Range Query in Smart Grid Auction Market,” in Proc. of ICC, Sydney, Australia, pp. 951-956, 2014. Article (CrossRef Link) |
21 | H. Li, R. Lu, L. Zhou, B. Yang, X. Shen, “An efficient merkle tree based authentication scheme for smart grid,” IEEE Systems Journal, vol. 8, no.2, pp. 655 - 663, 2014. Article (CrossRef Link) DOI |
22 | H. Li, X. Liang, R. Lu, X. Lin, X. Shen, “Edr: An efficient demand response scheme for achieving forward secrecy in smart grid,” in Proc. of GLOBECOM, pp. 929-934, 2012. Article (CrossRef Link) |
23 | H. Liang, B. Choi, W. Zhuang, X. Shen, “Towards optimal energy store-carry-and-deliver for phevs via v2g system,” in Proc. of INFOCOM, pp. 167-1682, 2012. Article (CrossRef Link) |
24 | J. Liu, Y. Xiao, S. Li, W. Liang, C. Chen, “Cyber security and privacy issues in smart grids,” IEEE Communications Surveys and Tutorials, vol. 14, no. 4, pp. 981-997, 2012. Article (CrossRef Link) DOI |
25 | H. Liang, B. Choi, A. Abdrabou, W. Zhuang, X. Shen, “Decentralized economic dispatch in microgrids via heterogeneous wireless networks,” IEEE journal on Selected Areas in communications, vol. 30, no. 6, pp. 1061-1074, 2012. Article (CrossRef Link) DOI |
![]() |