36,560 Hits in 4.1 sec

Access Control Encryption for Equality, Comparison, and More [chapter]

Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
2017 Lecture Notes in Computer Science  
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to read but also what they are allowed to write.  ...  In this work we answer the question in the affirmative by giving (efficient) constructions of ACE for an interesting class of predicates which includes equality, comparison, interval membership, and more  ...  We would like to thank the reviewers of PKC'17 for their diligent proofreading and valuable remarks, helping us to improve the paper.  ... 
doi:10.1007/978-3-662-54388-7_4 fatcat:hhp4jbrlijh55d5qdax7rkrljq

A Review on Access Control Policy and Key Generation in Data Sharing

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant
2019 International Journal of Advanced Engineering Research and Science  
Performance comparisons and experimental results show that PASH is more efficient and expressive than previous schemes. D.  ...   Comparison Of ABE Schemes III. PROPOSE WORK We go for implementation of cloud based system which deals with complexity of access control policy & dynamic group data sharing problem.  ... 
doi:10.22161/ijaers.6.2.6 fatcat:jghs5et6lbhxxjgd7e2c2d2cve

Enabling secure location-based services in mobile cloud computing

Yan Zhu, Di Ma, Dijiang Huang, Changjun Hu
2013 Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing - MCC '13  
In this paper, we propose an innovative location-based fine-grained access control mechanism for LBSs, enabling effective finegrained access control, location-based authentication and privacy protection  ...  To ensure the credibility and availability of LBSs, there is a pressing requirement for addressing access control, authentication and privacy issues of LBSs in a synergistic way.  ...  Attribute based encryption (ABE) schemes [8, 9] have been recently introduced for fine-grained access control.  ... 
doi:10.1145/2491266.2491272 dblp:conf/sigcomm/ZhuMHH13 fatcat:bko6dnmeizbyxfb5b5jjc5gztu

Exploration of Attribute Based Encryption Schemes on Cloud Computing Storage

2020 International journal of recent technology and engineering  
The storage of Electronic Health records on cloud storage has lead to the need for security and privacy concern.  ...  Different methods were proposed to prevent both internal and external threat in the healthcare framework. To guarantee security on health care records access control approach is required.  ...  and Concrete Construction Access policies, cipher-text of equal size and cloud server for equality test, public parameter, secret key, list of attributes To develop a CP ABE with a test for  ... 
doi:10.35940/ijrte.e6764.018520 fatcat:yf5xzzes5bd6deb52xfs3wtrbq

AES–CP–IDABE: A Privacy Protection Framework against a DoS Attack in the Cloud Environment with the Access Control Mechanism

Sonali Chandel, Geng Yang, Sumit Chakravarty
2020 Information  
its access control.  ...  The user access control is established using the digital signature with the help of user ID and security keys.  ...  explicitly in the field of data privacy and access control.  ... 
doi:10.3390/info11080372 fatcat:fcztehnewjbkzemrzb6wswsicu


Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino
2015 Proceedings of the 5th ACM Conference on Data and Application Security and Privacy - CODASPY '15  
DBMask is a system that implements encrypted query processing with support for complex queries and fine grained access control with create, update, delete and cryptographically enforced read (CRUD) operations  ...  DBMask proposes a novel technique that separates fine grained access control from encrypted query processing when evaluating SQL queries on encrypted data and enforces fine grained access control at the  ...  TRANSACTIONS ON DATA PRIVACY 9 (2016) DBMask: Fine-Grained Access Control on Encrypted Relational Databases  ... 
doi:10.1145/2699026.2699101 dblp:conf/codaspy/SarfrazNCB15 fatcat:dzldexth2zeidmptxro4gv4yoi

Database Encryption [chapter]

Alex Biryukov, Christophe De Cannière, William E. Winkler, Charu C. Aggarwal, Markus Kuhn, Luc Bouganim, Yanli Guo, Bart Preneel, Gerrit Bleumer, Tor Helleseth, Ran Canetti, Mayank Varia (+35 others)
2011 Encyclopedia of Cryptography and Security  
Database security, Data confidentiality, Hardware Security Module Definition Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted  ...  database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).  ...  to use indexes for equality predicates encrypting the searched value.  ... 
doi:10.1007/978-1-4419-5906-5_677 fatcat:banirq7k4zatjp4gue5o7p2hei

A Distributed Access Control with Outsourced Computation in Fog Computing

Qihua Wang, Huaqun Wang, Yufeng Wang, Rui Guo
2019 Security and Communication Networks  
Designing an efficient and secure fine-grained access control strategy for personal health records is facing enormous challenges.  ...  In order to decrease the computational overhead and ensure the confidentiality of electronic health records, a distributed fine-grained access control scheme with outsourced computation for IOT is proposed  ...  Figures 8 and 9 show the comparison of encryption cost and decryption cost, respectively. When the value equals 1 or 2, the encryption cost of our scheme is worse than that in scheme [2, 9] .  ... 
doi:10.1155/2019/6782753 fatcat:agjphugduvacdpstatkbzzcvby

Multi-Level Attribute-Based Encryption Access Control Scheme for Big Data

Zhao Li, Shuiyuan Huan, J. Heled, A. Yuan
2018 MATEC Web of Conferences  
Based on CP-ABE method, a multi-level attributebased encryption scheme is designed to solve fine-grained access control problem.  ...  capability existing in the current research on big data access control, a new model to support fine-grained access control and flexible attribute change is proposed.  ...  In comparison, attribute-based encryption can provide more secure and efficient access control and are widely discussed in the new computing environment. Goyal et al.  ... 
doi:10.1051/matecconf/201817303047 fatcat:zoxjplclhnb63btlj624hs7tk4

Confidentiality-Preserving Publish/Subscribe

Emanuel Onica, Pascal Felber, Hugues Mercier, Etienne Rivière
2016 ACM Computing Surveys  
This survey classifies and analyzes different approaches to confidentiality preservation for pub/sub, from applications of trust and access control models to novel encryption techniques.  ...  It is a natural fit for deployment in untrusted environments such as public clouds linking applications across multiple sites.  ...  Matching schemes using pre-mapped equality comparisons include schemes that rely on attribute-based encryption (ABE), although in most cases is used for access control and not for encrypted matching.  ... 
doi:10.1145/2940296 fatcat:dba4fatv2ffkrizjyhjjfihsoy

Private function evaluation by local two-party computation

Stefan Rass, Peter Schartner, Monika Brodbeck
2015 EURASIP Journal on Information Security  
Given the importance that these services have reached in our daily life, the demand for security and privacy in the data processing appears equally large.  ...  An optimal cryptographic support for private data processing must in any case be scalable and lightweight.  ...  Acknowledgements We wish to thank the anonymous reviewers for the valuable suggestions, which provided much of an improvement for the text and also delivered interesting ideas for subsequent research.  ... 
doi:10.1186/s13635-015-0025-9 fatcat:y5tivflng5atnaxlvk42ktsqcq

A Comparison Between Parallel and Segmentation Methods Used for Image Encryption-Decryption

Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein
2016 International Journal of Computer Science & Information Technology (IJCSIT)  
In this paper we made a comparison study between two image encryption techniques based on matrix multiplication namely, segmentation and parallel methods.  ...  Preserving confidentiality, integrity and authenticity of images is becoming very important. There are so many different encryption techniques to protect images from unauthorized access.  ...  It includes several aspects like copyright protection, authentication, confidentiality and access control.  ... 
doi:10.5121/ijcsit.2016.8509 fatcat:7kh4ll4uknbhbc6d5pu2sexs3e

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

2019 International Journal of Engineering  
By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage.  ...  We introduce and address the problem to more robustness of whole networks when DoS attacks are present.  ...  In a CP-ABE access control system, the Data Owner (DO) encrypts the data with a public key and access policy (for example an access tree built by AND, OR gates).  ... 
doi:10.5829/ije.2019.32.09c.09 fatcat:f5go5sayn5cnfaksa56m4e6ms4

Security and privacy in cloud computing

Rajat Soni, Smrutee Ambalkar, Pratosh Bansal
2016 2016 Symposium on Colossal Data Analysis and Networking (CDAN)  
The main aim of the paper is to provide more visibility and control to the end-users and close the gap between capabilities of existing solutions and new requirements of cloud-based systems.  ...  In this paper various existing approaches and issues related to data encryption and message authentications are also discussed.  ...  In [54] , for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data.  ... 
doi:10.1109/cdan.2016.7570962 fatcat:g5mwhulgjnbg5ppfo6syqs5ieu

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
For more information, see VOLUME 7, 2019 P.  ...  In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  TABLE 23 . 23 Comparison of several trust encryption multi-tenant access control scheme. TABLE 24 . 24 Comparison of several access control model-based encryption.  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje
« Previous Showing results 1 — 15 out of 36,560 results