Return to Article Details Secure Data Access Control with Cipher Text Update and Computation Outsourcing in Fog Computing for Internet of Things Download Download PDF