• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 480
Next 10 →

A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage

by Chi-Wei Liu , Wei-Fu Hsien , Chou-Chen Yang , Min-Shiang Hwang , Min-Shiang Hwang
"... Abstract Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the ..."
Abstract - Add to MetaCart
, the user outsources data directly in cloud storage service that is unsafe when outsourcing data is sensitive for the user. Therefore, ciphertext-policy attribute-based encryption is a promising cryptographic solution in cloud environment, which can be drawn up for access control by the data owner to define

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

by Vinoth Kumar P
"... Abstract:In a Cloud Computing the data security achieved by Data Access Control Scheme. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access pol ..."
Abstract - Add to MetaCart
Abstract:In a Cloud Computing the data security achieved by Data Access Control Scheme. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access

Dynamic credentials and ciphertext delegation for attribute-based encryption

by Amit Sahai, Hakan Seyalioglu - in Proceedings of the 32nd Annual International Cryptology Conference: Advances in Cryptology - CRYPTO’2012 , 2012
"... Motivated by the question of access control in cloud storage, we consider the problem using Attribute-Based Encryption (ABE) in a setting where users ’ credentials may change and ciphertexts may be stored by a third party. We find that a comprehensive solution to our problem must simultaneously allo ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
Motivated by the question of access control in cloud storage, we consider the problem using Attribute-Based Encryption (ABE) in a setting where users ’ credentials may change and ciphertexts may be stored by a third party. We find that a comprehensive solution to our problem must simultaneously

1PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption

by Sonia Jahid, Nikita Borisov
"... Abstract—Access control to data in traditional enterprises is typically enforced through reference monitors. However, as more and more enterprise data is outsourced, trusting third party storage servers is getting challenging. As a result, cryptography, specifically Attribute-based encryption (ABE) ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract—Access control to data in traditional enterprises is typically enforced through reference monitors. However, as more and more enterprise data is outsourced, trusting third party storage servers is getting challenging. As a result, cryptography, specifically Attribute-based encryption (ABE

TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems

by Kan Yang, Zhen Liu, Zhenfu Cao, Xiaohua Jia, Duncan S. Wong, Kui Ren
"... Abstract—Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE), as a promising techniqu ..."
Abstract - Add to MetaCart
problem. In this paper, we consider the problem of attribute revocation in multiauthority cloud storage systems where the users ’ attributes come from different domains each of which is managed by a different authority. We propose TAAC (Temporal Attributebased Access Control), an efficient data access

Attribute-Based Encryption Optimized for Cloud Computing

by Máté Horváth
"... Abstract. In this work, we aim to make attribute-based encryption (ABE) more suitable for access control to data stored in the cloud. For this purpose, we concentrate on giving to the encryptor full control over the access rights, providing feasible key management even in case of multiple independen ..."
Abstract - Add to MetaCart
Abstract. In this work, we aim to make attribute-based encryption (ABE) more suitable for access control to data stored in the cloud. For this purpose, we concentrate on giving to the encryptor full control over the access rights, providing feasible key management even in case of multiple

Revocable Data Access Control in Public

by unknown authors
"... Abstract:- A new suburbanised access management theme for secure information storage in clouds that support anonymous authentication. Throughout this theme, the cloud verifies the credibility of the user whereas not knowing the user’s identity before storing information and in addition has added the ..."
Abstract - Add to MetaCart
Abstract:- A new suburbanised access management theme for secure information storage in clouds that support anonymous authentication. Throughout this theme, the cloud verifies the credibility of the user whereas not knowing the user’s identity before storing information and in addition has added

Attribute based data sharing with attribute revocation

by Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou - in Proc. of ASIACCS. ACM
"... Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set of attributes and data are encrypted with ac-cess structures on attributes. A user is able to decrypt a ciphertex ..."
Abstract - Cited by 103 (5 self) - Add to MetaCart
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set of attributes and data are encrypted with ac-cess structures on attributes. A user is able to decrypt a

K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access?

by Saman Zar, Danfeng (daphne Yao, Vinod Ganapathy
"... Abstract. Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. We present a user-centric privacy-preserving cryptographic access control protocol called K2C (Key To Cloud) that enables end-users to securely store, share, and manage their sensiti ..."
Abstract - Add to MetaCart
Abstract. Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. We present a user-centric privacy-preserving cryptographic access control protocol called K2C (Key To Cloud) that enables end-users to securely store, share, and manage

Study on Competent and Revocable Data Access Control Scheme for Multi-Authority Cloud Storage Systems

by unknown authors
"... *A.Shekinah prema sunaina Abstract: Cloud computing multi-tenancy feature, which provides privacy, security and access control challenges, because of sharing of physical resources among untrusted tenants. In order to achieve safe storage, policy based file access control, policy based file assured d ..."
Abstract - Add to MetaCart
deletion and policy based renewal of a file stored in a cloud environment, a suitable encryption technique with key management should be applied before outsourcing the data. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control
Next 10 →
Results 1 - 10 of 480
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University