[1] WOOD T,RAMAKRISHNAN K,SHENOY P,et al. CloudNet:dynamic pooling of cloud resources by live WAN migration of virtual machines[J]. IEEE/ACM Transactions on Networking,2015,23(5):1568-1583. [2] YI S,QIN Z,LI Q. Security and privacy issues of fog computing:a survey[C]//Proceedings of the 2015 International Conference on Wireless Algorithms,Systems,and Applications,LNCS 9204. Cham:Springer,2015:685-695. [3] Statista. Forecast of fog computing market revenue worldwide from 2018 to 2022[EB/OL].[2020-08-12]. https://www.statista.com/statistics/830485/world-fog-computing-revenue-by-vertical/. [4] STOJMENOVIC I,WEN S. The fog computing paradigm:scenarios and security issues[C]//Proceedings of the 2014 Federated Conference on Computer Science and Information Systems. Piscataway:IEEE,2014:1-8. [5] ROMAN R,LOPEZ J,MAMBO M. Mobile edge computing,Fog et al.:A survey and analysis of security threats and challenges[J]. Future Generation Computer Systems,2018,78(Pt 2):680-698. [6] STOJMENOVIC I,WEN S,HUANG X,et al. An overview of fog computing and its security issues[J]. Concurrency and Computation:Practice and Experience,2016,28(10):2991-3005. [7] HUANG X,XIANG Y,BERTINO E,et al. Robust multi-factor authentication for fragile communications[J]. IEEE Transactions on Dependable and Secure Computing,2014,11(6):568-581. [8] CHOO K K R, DOMINGO-FERRER J, ZHANG L. Cloud cryptography:theory,practice and future research directions[J]. Future Generation Computer Systems,2016,62:51-53. [9] SAHAI A,WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 3494. Berlin:Springer,2005:457-473. [10] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 2006 13th ACM Conference on Computer and Communications Security. New York:ACM,2006:89-98. [11] BETHENCOURT J,SAHAI A,WATERS B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway:IEEE,2007:321-334. [12] LIU Z,CAO Z,WONG D S. White-box traceable ciphertextpolicy attribute-based encryption supporting any monotone access structures[J]. IEEE Transactions on Information Forensics and Security,2013,8(1):76-88. [13] NING J,CAO Z,DONG X,et al. Large universe ciphertextpolicy attribute-based encryption with white-box traceability[C]//Proceedings of the 2014 European Symposium on Research in Computer Security,LNCS 8713. Cham:Springer,2014:55-72. [14] NING J,DONG X,CAO Z,et al. White-box traceable ciphertextpolicy attribute-based encryption supporting flexible attributes[J]. IEEE Transactions on Information Forensics and Security, 2015,10(6):1274-1288. [15] YANG K,JIA X,REN K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems[C]//Proceedings of the 2013 8th ACM SIGSAC Symposium on Information,Computer and Communications Security. New York:ACM,2013:523-528. [16] 高嘉昕, 孙加萌, 秦静. 支持属性撤销的可追踪外包属性加密方案[J]. 计算机研究与发展, 2019, 56(10):2160-2169.(GAO J X, SUN J M, QIN J. Traceable outsourcing attribute-based encryption with attribute revocation[J]. Journal of Computer Research and Development,2019,56(10):2160-2169.) [17] 王鹏翩, 冯登国, 张立武. 一种支持完全细粒度属性撤销的CPABE方案[J]. 软件学报, 2012, 23(10):2805-2816.(WANG P P,FENG D G,ZHANG L W. CP-ABE scheme supporting fully fine-grained attribute revocation[J]. Journal of Software,2012, 23(10):2805-2816.) [18] 明洋, 何宝康. 支持属性撤销的可验证外包的多授权属性加密方案[J]. 计算机应用, 2019, 39(12):3556-3562.(MING Y,HE B K. Attribute revocation and verifiable outsourcing supported multi-authority attribute-based encryption scheme[J]. Journal of Computer Applications,2019,39(12):3556-3562.) [19] YU S,WANG C,REN K,et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 2010 5th ACM Symposium on Information, Computer and Communications Security. New York:ACM,2010:261-270. [20] LI Y,ZHU J,WANG X,et al. Optimized ciphertext-policy attribute-based encryption with efficient revocation[J]. International Journal of Security and Its Applications,2013,7(6):385-394. [21] LI Q,XIONG H,ZHANG F. Broadcast revocation scheme in composite-order bilinear group and its application to attributebased encryption[J]. International Journal of Security and Networks,2013,8(1):1-12. [22] SHI Y,ZHENG Q,LIU J,et al. Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation[J]. Information Sciences,2015,295:221-231. [23] 林娟, 薛庆水, 曹珍富. 基于代理的即时属性撤销KP-ABE方案[J]. 计算机工程, 2014, 40(10):20-24.(LING J,XUE Q S, CAO Z F. Proxy-based immediate attribute revocation KP-ABE scheme[J]. Computer Engineering,2014,40(10):20-24.) [24] XU S,NING J,LI Y,et al. Match in my way:fine-grained bilateral access control for secure cloud-fog computing[J]. IEEE Transaction on Dependable and Secure Computing,2020(Early Access):1-15. [25] LIU Z, DUAN S, ZHOU P, et al. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme[J]. Future Generation Computer Systems,2019,93:903-913. [26] XU S,YANG G,MU Y,et al. Secure fine-grained access control and data sharing for dynamic groups in the cloud[J] IEEE Transactions on Information Forensics and Security,2018,13(8):2101-2113. [27] WATERS B. Ciphertext-policy attribute-based encryption:an expressive, efficient, and provably secure realization[C]//Proceedings of the 2011 International Workshop on Public Key Cryptography,LNCS 6571. Berlin:Springer,2011:53-70. [28] JIANG Y,SUSILO W,MU Y,et al. Ciphertext-policy attributebased encryption against key-delegation abuse in fog computing[J]. Future Generation Computer Systems,2018,78(Pt2):720-729. [29] HOANG V H,LEHTIHET E,GHAMRI-DOUDANE Y. Forwardsecure data outsourcing based on revocable attribute-based encryption[C]//Proceedings of the 2019 15th International Wireless Communications and Mobile Computing Conference. Piscataway:IEEE,2019:1839-1846. [30] ZHANG Y,ZHENG D,DENG R H. Security and privacy in smart health:efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal,2018,5(3):2130-2145. [31] WANG S, GUO K, ZHANG Y. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage[J]. PLoS ONE,2018,13(9):Article No. e0203225. [32] LI L, WANG Z, LI N. Efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fogenabled IoT[J]. IEEE Access,2020,8:176738-176749. |