This integration of blockchain technology with Ciphertext- Policy Attribute-Based Encryption (CP-ABE) addresses key management challenges for cloud-stored data. The paper em- phasizes several key advancements. Firstly, the combination enhances security by utilizing blockchain’s decentralized and immutable ledger for key distribution, making the process tamper-proof and ensuring that keys are accessible only to authorized users. This integration also offers a more transpar- ent and auditable key management system, enabling contin- uous monitoring and easier detection of potential breaches. Additionally, blockchain helps streamline key management processes, improving efficiency and scalability in cloud en- vironments. By overcoming the limitations of traditional key management systems and providing a robust framework for protecting sensitive data, this approach significantly enhances data security in cloud storage systems [
1]. A significant advancement in cloud data security by proposing a novel CP- ABE framework. This approach introduces an online/offline multi-authority model to enhance data sharing security, dis- tributing control over attributes among multiple authorities. This distribution mitigates the risks associated with a single point of failure and strengthens the system’s overall resilience. A key innovation is the hidden policy feature, which pro- tects user attributes and access policies from exposure during encryption and decryption, thereby improving privacy and reducing the risk of policy leakage. The paper also addresses efficiency concerns by employing an online/offline model, which allows certain computational tasks to be completed offline. This optimization reduces the time and resources required for encryption and decryption, making the system more operationally efficient. Additionally, the framework en- sures privacy-preserving data sharing by obfuscating sensitive information and controlling access, thus maintaining high privacy standards while facilitating secure data exchange. The scalability and flexibility of the multi-authority setup further support its adaptability to various cloud environments and large-scale data-sharing scenarios, demonstrating its effective- ness in meeting diverse application needs [
2]. The privacy- preserving mechanisms are designed for information sharing in Online Social Networks (OSNs), specifically through Privacy Situation Awareness (PSA). OSNs are widely used platforms where users share personal information, which raises signif- icant privacy concerns due to potential exposure to unautho- rized parties. The paper examines mechanisms that enhance privacy by incorporating situational awareness into the data- sharing process. PSA involves understanding and adapting to the privacy context of both the data and the user, allowing for more informed and dynamic control over what information is shared and with whom. Key points include the implementation of context-aware policies that adjust privacy settings based on real-time situational factors and user preferences. The review also covers various approaches to balancing user privacy with the need for effective information sharing, highlighting advancements in privacy technology and their impact on safeguarding sensitive data in OSNs [
3].This explores the application of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) in smart cities, focusing on enhancing both security and privacy through hidden sensitive policies and keyword search techniques. In smart city environments, where large volumes of sensitive data are generated and shared, protecting this information while ensuring efficient access is crucial. The paper introduces a CP-ABE scheme that incorporates hidden sensitive policies to obscure the details of access controls and encryption parameters, thereby safeguarding user privacy and preventing unauthorized disclosure of policy information. Ad- ditionally, it integrates keyword search capabilities, allowing users to perform searches on encrypted data without revealing the content or search queries. This approach not only enhances the privacy of the data but also improves retrieval efficiency, addressing the dual needs of security and usability in smart city data management systems [
4]. This investigates the application of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) within Internet of Things (IoT) systems, specifically using MQTT (Message Queuing Telemetry Transport) for commu- nication and Raspberry Pi as the hardware platform. CP-ABE is utilized to enhance the security of data transmitted between IoT devices, ensuring that only authorized users with specific attributes can access the encrypted information. The integra- tion of MQTT, a lightweight messaging protocol, facilitates efficient and scalable communication in IoT environments, while Raspberry Pi serves as a cost-effective and versatile computing platform. The paper examines how CP-ABE can be implemented to secure MQTT messages addresses challenges related to key management and computational resources, and evaluates the performance of this approach in a practical IoT setup [
5]. This presents a non-interactive verifiable computa-tion model for perceptual layer data using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). The proposed model addresses the challenge of ensuring the integrity and correct- ness of computations performed on encrypted data without requiring interaction between the data owner and the com- putational entity. By leveraging CP-ABE, the model enables fine-grained access control over encrypted data, ensuring that only authorized parties can perform and verify computations. This approach enhances data security and privacy by allow- ing verifiable results while maintaining the confidentiality of the data. The paper highlights the model’s effectiveness in enabling secure and trustworthy computations on encrypted perceptual layer data, making it a valuable contribution to the field of secure data processing and management [
6]. The Multi-Layered Ciphertext-Policy Attribute-Based Encryption (CP-ABE) Scheme for Flexible Policy Update addresses the challenge of dynamically updating access policies in the context of Industry 4.0. This scheme enhances traditional CP- ABE by introducing a multi-layered architecture that supports flexible and efficient policy updates. In Industry 4.0 envi- ronments, where systems and access requirements frequently change, the ability to quickly adapt access control policies without compromising security is crucial. The multi-layered approach allows for hierarchical policy management, enabling updates to be made at various levels of the access control structure while maintaining overall security. This method improves scalability and adaptability, making it well-suited for the complex and evolving data management needs of modern industrial systems [
7]. The paper on the ”Data Con- firmation Scheme based on Auditable CP-ABE” introduces a novel approach to enhance the verification and auditing of data within Ciphertext-Policy Attribute-Based Encryption (CP- ABE) systems. It focuses on integrating auditing mechanisms into CP-ABE to provide a reliable method for confirming the integrity and authenticity of encrypted data. The scheme allows for periodic or event-driven audits, enabling auditors to verify that data has not been tampered with and that access controls are properly enforced. This integration ensures that the data remains secure and compliant with defined policies, while also providing a transparent and accountable framework for managing encrypted data in both cloud and distributed environments [
8].This paper presents an efficient anonymous identity authentication scheme for the Internet of Vehicles (IoV) using Ciphertext-Policy Attribute-Based Encryption (CP-ABE) combined with consortium blockchain technology. The proposed approach addresses the challenge of securely managing and verifying identities in IoV environ- ments, where privacy and authentication are critical. CP-ABE enables fine-grained access control and encryption of identity- related information, while the consortium blockchain provides a secure and tamper-proof infrastructure for managing au- thentication data and transactions. The integration of these technologies ensures that vehicle identities are authenticated anonymously, protecting user privacy while maintaining the integrity and security of the authentication process. This scheme enhances both the security and efficiency of identity management in IoV systems, offering a robust solution for protecting sensitive information in a highly interconnected environment [
9]. This paper introduces a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) method that leverages reused sub-policies to improve efficiency and scalability. The proposed method optimizes the encryption process by reusing existing sub-policies, thereby reducing computational over- head and storage requirements associated with policy man- agement. This approach enhances the efficiency of CP-ABE in environments with large-scale or dynamic attribute sets, making it more practical for real-world applications where frequent policy updates and high-performance demands are common. By addressing the challenges of scalability and resource utilization, this method provides a more efficient so- lution for implementing fine-grained access control in various secure data management scenarios [
10]. This distributed cryp- tography technique is aimed at enabling lightweight encryption in decentralized Ciphertext-Policy Attribute-Based Encryption (CP-ABE) systems. The focus is on optimizing encryption processes to be more efficient and resource-friendly, par- ticularly in decentralized environments where computational resources may be limited. By leveraging distributed cryp- tographic methods, the approach reduces the computational overhead and enhances the scalability of CP-ABE, making it suitable for use in resource-constrained settings. The paper highlights how these techniques improve the performance of decentralized CP-ABE systems, enabling secure and efficient data encryption and access control in environments with limited computational resources [
11]. The lightweight, pairing- free multi-authority Ciphertext-Policy Attribute-Based Encryp- tion (CP-ABE) scheme is designed for cloud-edge-assisted Internet of Things (IoT) environments. The proposed scheme addresses the scalability and efficiency challenges associated with traditional CP-ABE methods, particularly in distributed IoT systems where resource constraints and performance are critical. By eliminating the need for costly pairing operations, the scheme reduces computational overhead and improves sys- tem efficiency. The multi-authority approach enhances security by distributing trust among multiple entities, allowing for more flexible and robust access control in cloud-edge-assisted IoT architectures. This scheme effectively balances security and performance, making it well-suited for the demands of modern IoT applications [
12]. The enhancement of Unmanned Aerial Vehicle (UAV) security through the implementation of Zero Trust Architecture (ZTA), incorporating advanced deep learning and Explainable AI (XAI) techniques. The study ad- dresses the growing security challenges faced by UAVs, which require robust measures to protect against potential threats and vulnerabilities. By adopting Zero Trust principles, the ap- proach ensures that no entity—whether internal or external—is inherently trusted, necessitating continuous verification and validation of all access requests. The integration of deep learn- ing models enhances threat detection and response capabilities, while Explainable AI provides transparency and interpretabil- ity of these models, allowing for better understanding and trust in the security decisions made. This combination offers a comprehensive and adaptive security framework for UAVs, improving their resilience against sophisticated attacks and ensuring a higher level of protection in dynamic and complex environments [
13]. The integration of YOLO v7 with advanced edge computing for fall detection addresses the pressing issue of elderly safety. Existing fall detection systems often lack speed and accuracy, necessitating a transformative solution. YOLO v7’s deep neural network architecture efficiently pro- cesses video feeds, while edge computing minimizes latency. This approach not only ensures rapid analysis and immediate responses but also maintains privacy by keeping data localized. Beyond elder care, this innovative solution holds promise for enhancing safety across various sectors, heralding a future where advanced technology prioritizes personal well-being. A Deep Learning-based smart traffic light system leverages YOLO v7 for image processing to optimize traffic flow. YOLO v7, known for its speed and accuracy, detects and classifies vehicles in real-time from traffic camera feeds. The system adjusts traffic light timings based on vehicle density and move- ment patterns, reducing congestion and improving efficiency. High-quality datasets of annotated traffic images are used to train the YOLO v7 model, ensuring accurate vehicle detection and classification. This smart traffic light system enhances traffic management by minimizing delays and adapting to real-time traffic conditions [
14]. Image-based foreign object detection using the YOLO v7 algorithm for electric vehicle wireless charging applications enhances safety and efficiency by identifying and removing obstacles. YOLO v7’s speed and accuracy allow real-time detection of foreign objects on charging pads, preventing potential damage or interference. High-quality datasets with annotated images of various objects ensure the model’s robustness and accuracy. Implementing this system improves the reliability of wireless charging stations by ensuring a clear, unobstructed charging area, ultimately protecting both the vehicle and the charging infrastructure[
15]. Improving object detection accuracy in VVC-coded video using YOLO v7 features involves leveraging YOLO v7’s superior detection capabilities. YOLO v7, known for its speed and precision, enhances object detection in compressed VVC video streams. By utilizing high-quality training datasets with annotated objects, the system can accurately detect objects despite video compression artifacts. This integration optimizes the balance between compression efficiency and detection per- formance, leading to more reliable object recognition in VVC- coded videos[
16]. An improved nighttime detection algorithm based on YOLO v7 enhances the identification of people and vehicles in low-light conditions by leveraging YOLO v7’s advanced detection capabilities. This algorithm is specially designed to overcome the challenges posed by nighttime envi- ronments, such as low visibility, glare from artificial lighting, and varying light conditions. By using high-quality, annotated datasets specifically collected during nighttime, the system ensures robust performance and accuracy. The algorithm can effectively distinguish between people and vehicles even in dimly lit areas, making it particularly useful for applications like surveillance, security, and traffic monitoring at night. This enhanced detection capability contributes to increased safety and security by providing reliable monitoring and alerting systems in environments where traditional detection methods often fail[
17]. Automated non-helmet rider detection using YOLO v7 and OCR enhances traffic monitoring by identifying motorcyclists without helmets. YOLO v7’s high-speed and accurate object detection capabilities enable real-time iden- tification of riders. By training the model with annotated datasets of helmeted and non-helmeted riders, the system can distinguish between the two effectively. OCR (Optical Character Recognition) is integrated to read license plates, allowing authorities to identify and penalize violators. This automated system improves road safety by ensuring compli- ance with helmet laws and provides a reliable solution for traffic enforcement. The combination of YOLO v7 and OCR ensures thorough monitoring and efficient processing, making it an invaluable tool for modern traffic management systems [
18]. This investigates the vulnerabilities and potential decep- tions associated with post-hoc Explainable AI (XAI) methods used in network intrusion detection systems. It examines how these explainability techniques, which are designed to provide insights into AI model decisions, can be manipulated or misled by adversarial attacks. The study highlights the limitations of current XAI approaches in accurately reflecting the true decision-making process of AI models and their susceptibility to deliberate distortions. By analyzing various post-hoc explanation methods, the paper underscores the need for more robust and reliable explainability mechanisms to improve the effectiveness and trustworthiness of network in- trusion detection systems [
19].This paper explores methods for enhancing the fairness and performance of edge cameras using Explainable AI (XAI) techniques. It addresses the challenge of ensuring that edge cameras, which are critical for applica- tions such as surveillance and monitoring, operate fairly and efficiently across diverse scenarios. The use of XAI helps in interpreting and understanding the decision-making processes of AI models deployed in edge devices, allowing for greater transparency and accountability. By applying XAI, the paper aims to improve the accuracy and fairness of camera-based systems, ensuring that they provide reliable and unbiased performance while maintaining high operational standards in real-time environments [
20]. The integration of Explainable AI (XAI) into Intrusion Detection Systems (IDS) enhances their effectiveness and transparency in cloud environments and addresses the challenge of making IDS more effective and transparent by incorporating explainability into AI-driven detection mechanisms. By leveraging XAI, the paper aims to improve the interpretability of AI models used in IDS, allowing security analysts to better understand and trust the system’s decisions. This approach not only enhances the detection of malicious activities but also aids in the inves- tigation and response processes by providing clear, actionable insights into how decisions are made. The integration of XAI into IDS is presented as a crucial step toward more reliable and understandable security solutions for protecting cloud infrastructures [
21]. The potential of using Explainable