[1] Bokefode J.D., Bhise A.S., Satarkar P.A., andModani D.G.Developing a Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption. Procedia Computer Science, vol. 89, pp. 43-50, 2016. [2] Amin R., Kumar N., Biswas G.P., Iqbal R., andChang V.A Light Weight Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment. Future Generation Computer Systems, vol. 78, pp. 1005-1019, 2018. [3] Ganapathy S.A Secured Storage and Privacy-Preserving Model using CRT for Providing Security on Cloud and IoT-Based Applications. Computer Networks, vol. 151, pp. 181-190, 2019. [4] Li X., Wang Q., Lan X., Chen X., Zhang N. and Chen D.Enhancing Cloud-Based IoT Security through Trustworthy Cloud Service: An Integration of Security and Reputation Approach. IEEE Access, vol. 7, pp. 9368-9383, 2019. [5] Singh S., Sharma P.K., Moon S.Y., andPark J.H.Advanced Lightweight Encryption Algorithms for IoT Devices: Survey, Challenges and Solutions.Journal of Ambient Intelligence and Humanized Computing, pp. 1-18, 2017. [6] Nedham, W.B. and Al-Qurabat, A.K.M. A Comprehensive Review of Clustering Approaches for Energy Efficiency in Wireless Sensor Networks. International Journal of Computer Applications in Technology, vol. 72, no. 2, pp. 139-160, 2023. [7] Perazzo P., Righetti F., La Manna, M., and Vallati, C. Performance Evaluation of Attribute-Based Encryption on Constrained IoT Devices. Computer Communications, vol. 170, pp. 151-163, 2021. [8] Sun X., Wang H., Fu X., Qin H., Jiang M., Xue L., andWei X.Substring-Searchable Attribute-Based Encryption and Its Application for IoT Devices. Digital Communications and Networks, vol. 7, no. 2, pp. 277-283, 2021. [9] Zhou L., Li X., Yeh K.H., Su C., andChiu W.Lightweight IoT-Based Authentication Scheme in Cloud Computing Circumstance. Future generation computer systems, vol. 91, pp. 244-251, 2019. [10] Mousavi S.K., Ghaffari A., Besharat S., andAfshari H.Improving the Security of Internet of Things using Cryptographic Algorithms: A Case of Smart Irrigation Systems. Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 2033-2051, 2021. [11] Sun X., Wang H., Fu X., Qin H., Jiang M., Xue L., andWei X.Substring-Searchable Attribute-Based Encryption and Its Application for IoT Devices. Digital Communications and Networks, vol. 7, no. 2, pp. 277-283, 2021. [12] Nakagawa, I. and Shimojo, S.IoT Agent Platform Mechanism with Transparent Cloud Computing Framework for Improving IoT Security. In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), IEEE, vol. 2, pp. 684-689, 2017. [13] Zhang Z., Zhang W., andQin Z.A Partially Hidden Policy CP-ABE Scheme Against Attribute Values Guessing Attacks with Online Privacy-Protective Decryption Testing in IoT Assisted Cloud Computing. Future Generation Computer Systems, vol. 123, pp. 181-195, 2021. [14] Yuliana M.,Wirawan, and Suwadi An Efficient Key Generation for the Internet of Things Based Synchronized Quantization. Sensors, vol. 19, no. 12, pp. 2674, 2019. [15] Galletta A., Taheri J., andVillari, M. on the Applicability of Secret Share Algorithms for Saving Data on IoT, Edge and Cloud Devices. In2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, pp. 14-21, 2019. [16] Zhang Y., Wei X., Cao J., Ning J., Ying Z., andZheng D.Blockchain-Enabled Decentralized Attribute-Based Access Control with Policy Hiding for Smart Healthcare. Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 10, pp. 8350-8361, 2022. [17] Banerjee S., Roy S., Odelu V., Das A.K., Chattopadhyay S., Rodrigues J.J., andPark Y.Multi-Authority CP-ABE-Based User Access Control Scheme with Constant-Size Key and Ciphertext for IoT Deployment. Journal of Information Security and Applications, vol. 53, pp. 102503, 2020. [18] Saravanan, N. and Umamakeswari, A.HAP-CP-ABE Based Encryption Technique with Hashed Access Policy Based Authentication Scheme for Privacy Preserving of PHR. Microprocessors and Microsystems, vol. 80, pp. 103540, 2021. [19] Yin H., Li Y., Li F., Deng H., Zhang W., andLi K.An Efficient and Access Policy-Hiding Keyword Search and Data Sharing Scheme in Cloud-Assisted IoT. Journal of Systems Architecture, vol. 128, pp. 102533, 2022. [20] Sowjanya K., Dasgupta M., andRay S.A Lightweight Key Management Scheme for Key-Escrow-Free ECC-Based CP-ABE for IoT Healthcare Systems. Journal of Systems Architecture, vol. 117, pp. 102108, 2021. [21] Bethencourt J., Sahai A., andWaters B.Ciphertext-Policy Attribute-Based Encryption. In2007 IEEE symposium on security and privacy (SP'07), IEEE, pp. 321-334, 2007. |