Results 1 - 10
of
571
POSTER: Temporal Attribute-Based Encryption in Clouds
"... There has been little work that explores cryptographic tem-poral constraints, especially for data sharing in cloud com-puting. In this paper, we present a temporal attribute-based encryption (TABE) scheme to implement temporal constraints for data access control in clouds. This scheme has a constant ..."
Abstract
- Add to MetaCart
There has been little work that explores cryptographic tem-poral constraints, especially for data sharing in cloud com-puting. In this paper, we present a temporal attribute-based encryption (TABE) scheme to implement temporal constraints for data access control in clouds. This scheme has a
Attribute-Based Encryption Optimized for Cloud Computing
"... Abstract. In this work, we aim to make attribute-based encryption (ABE) more suitable for access control to data stored in the cloud. For this purpose, we concentrate on giving to the encryptor full control over the access rights, providing feasible key management even in case of multiple independen ..."
Abstract
- Add to MetaCart
Abstract. In this work, we aim to make attribute-based encryption (ABE) more suitable for access control to data stored in the cloud. For this purpose, we concentrate on giving to the encryptor full control over the access rights, providing feasible key management even in case of multiple
A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE
"... Abstract:In a Cloud Computing the data security achieved by Data Access Control Scheme. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access pol ..."
Abstract
- Add to MetaCart
Abstract:In a Cloud Computing the data security achieved by Data Access Control Scheme. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access
Hybrid Attribute-Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds
"... Outsourcing data to the cloud is beneficial for reasons of economy, scalability, and accessi-bility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest-but-curious. Addi-tionally, cloud-bas ..."
Abstract
- Add to MetaCart
data is increasingly being accessed by resource-constrained mobile devices for which the processing and communication cost must be minimized. Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes
A survey of peer-to-peer content distribution technologies
- ACM Computing Surveys
, 2004
"... Distributed computer architectures labeled “peer-to-peer ” are designed for the sharing of computer resources (content, storage, CPU cycles) by direct exchange, rather than requiring the intermediation or support of a centralized server or authority. Peer-to-peer architectures are characterized by t ..."
Abstract
-
Cited by 378 (7 self)
- Add to MetaCart
and infrastructure technologies in terms of their distributed object location and routing mechanisms, their approach to content replication, caching and migration, their support for encryption, access control, authentication and identity, anonymity, deniability, accountability and reputation, and their use
Attribute-based Encryption with Break-glass
"... Abstract Attribute-based Encryption (ABE) allows for implementing fine-grained decentralized access control based on properties or attributes a user has. Thus, there is no need for writing detailed, user-based policies in advance. This makes ABE in particular interesting for implementing security me ..."
Abstract
-
Cited by 10 (3 self)
- Add to MetaCart
Abstract Attribute-based Encryption (ABE) allows for implementing fine-grained decentralized access control based on properties or attributes a user has. Thus, there is no need for writing detailed, user-based policies in advance. This makes ABE in particular interesting for implementing security
Fine-grained access control system based on outsourced attribute-based encryption
- Comput. Secur. 2013
"... Abstract. As cloud computing becomes prevalent, more and more sen-sitive data is being centralized into the cloud for sharing, which brings forth new challenges for outsourced data security and privacy. Attribute-based encryption (ABE) is a promising cryptographic primitive, which has been widely ap ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
. Aiming at tackling the challenge above, we present a generic and ef-cient solution to implement attribute-based access control system by introducing secure outsourcing techniques into ABE. More precisely, two cloud service providers (CSPs), namely key generation-cloud ser-vice provider (KG
Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview
"... Abstract-Cloud computing is going to be very famous technology in IT enterprises. For an enterprise, the data stored is huge and it is very precious. All tasks are performed through networks. Hence, it becomes very important to have the secured use of data. In cloud computing, the most important co ..."
Abstract
- Add to MetaCart
concerns of security are data security and privacy. And also flexible and scalable, fine grained access control must be maintained in the cloud systems. For access control, being one of the classic research topics, many schemes have been proposed and implemented. There are policy based schemes have been
A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption
"... The secure destruction of expired data is one of the important contents in the research of cloud storage security. Applying the attribute-based encryption (ABE) and the distributed hash table (DHT) technology to the process of data destruction, we propose a secure ciphertext self-destruction scheme ..."
Abstract
- Add to MetaCart
The secure destruction of expired data is one of the important contents in the research of cloud storage security. Applying the attribute-based encryption (ABE) and the distributed hash table (DHT) technology to the process of data destruction, we propose a secure ciphertext self
An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext
- Length in Mathematical Problems in Engineering Volume 19 , Article ID 810969
, 2013
"... There is an acceleration of adoption of cloud computing among enterprises. However, moving the infrastructure and sensitive data from trusted domain of the data owner to public cloud will pose severe security and privacy risks. Attribute-based encryption (ABE) is a new cryptographic primitive which ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE) is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys
Results 1 - 10
of
571