A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing.
Zhen ChengJiale ZhangHongyan QianMingrong XiangDi WuPublished in: ICA3PP (1) (2019)
Keyphrases
- cloud computing
- control scheme
- privacy preserving
- service providers
- data privacy
- closed loop
- control strategy
- privacy preserving data mining
- control system
- data center
- dynamic model
- multi party
- data management
- sensitive information
- private information
- access control
- distributed computing
- privacy concerns
- information systems
- data sets
- privacy protection