Filters








614 Hits in 4.1 sec

Access Control Encryption: Enforcing Information Flow with Cryptography [article]

Ivan Damgård and Helene Haagh and Claudio Orlandi
2016 arXiv   pre-print
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users not only in terms of which  ...  Our contributions are: - Introducing and formally defining access control encryption (ACE); - A construction of ACE with complexity linear in the number of the roles based on classic number theoretic assumptions  ...  Access Control Encryption: The Problem it Solves Senders and Receivers.  ... 
arXiv:1602.03642v2 fatcat:bnzj2wqd5bdanofgukihmjb24a

A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
If the match occurs, automatically file would be recovered by the user even if hacker access or tamper the file.  ...  Data sharing can be achieved with sensitive information hiding with remote data integrity auditing, propose a new concept called identity based shared data integrity auditing with sensitive information  ...  In the phase of integrity auditing, signatures are used to verify the integrity of the sanitized file.  ... 
doi:10.35940/ijitee.a1019.1191s19 fatcat:lxdc7ufngbhj5hlga23wrbttzm

Access Control Encryption: Enforcing Information Flow with Cryptography [chapter]

Ivan Damgård, Helene Haagh, Claudio Orlandi
2016 Lecture Notes in Computer Science  
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users not only in terms of which  ...  Our contributions are: -Introducing and formally defining access control encryption (ACE); -A construction of ACE with complexity linear in the number of the roles based on classic number theoretic assumptions  ...  Access Control Encryption: The Problem it Solves Senders and Receivers.  ... 
doi:10.1007/978-3-662-53644-5_21 fatcat:bfbriddj75hc5lwyn67dtwedly

Privacy and Security Aware Cloud Storage using Double Cryptography Method

2019 International journal of recent technology and engineering  
The principle applied to the proposed methodology is double encryption and double decryption. The encrypted files are decrypted to view the original data using the keys.  ...  In this paper, we proposed an improved double encryption-decryption (IDED) method for a secure cloud system.  ...  This method encloses with efficient key management and access permissions systems. It segmented before encryption on decryption correction combination gives a successful result.  ... 
doi:10.35940/ijrte.d1108.1284s219 fatcat:l6tb23qvwndrxinv4ybshw6mvu

Third-party enabled auditing for uniqueness-based integrity and data sharing with information hiding

J Faritha Banu, Shruti Kirti, T Archana, Utsav Krishna Pandey
2022 International Journal of Health Sciences  
An efficient auditing system to determine whether or not the data is corrupted is a challenging task among the recent research.  ...  The record blocks that report sensitive data are sanitized, and the signatures of those records blocks are converted into legitimate ones for the sanitized report.  ...  Implementation of Blind and sanitize algorithm Advanced Encryption Standards (AES) is one of the most extensively used encryption and decryption technologies.  ... 
doi:10.53730/ijhs.v6ns2.7373 fatcat:2hzbtcyte5gvreheaapvge6bme

Cross-Domain Attribute-Based Access Control Encryption [article]

Mahdi Sedaghat, Bart Preneel
2021 IACR Cryptology ePrint Archive  
At TCC 2016, Damgård et al. proposed Access Control Encryption (ACE) schemes where a predicate function decides whether or not users can read (decrypt) and write (encrypt) data, while the message secrecy  ...  Moreover, we propose an efficient scheme in which the sizes of ciphertexts and encryption and decryption keys are constant and thus independent of the number of receivers and their attributes.  ...  Research Flanders with reference number VR20192203.  ... 
dblp:journals/iacr/SedaghatP21 fatcat:2fdmrmbn3bghfd67iyxrpnwp3a

Fine-Grained Information Flow Control Using Attributes

Jinguang Han, Liqun Chen, Willy Susilo, Xinyi Huang, Aniello Castiglione, Kaitai Liang
2019 Information Sciences  
To enhance IFC, access control encryption (ACE) was proposed where both the no write-down rule and the no read-up rule are supported.  ...  the number of required * Corresponding author. attributes or receivers; (3) weak attribute privacy is achieved; (4) fine-grained access policies on encrypted data are supported; (5) the communication  ...  [14] , access control encryption (ACE) is a new public-key encryption scheme where all communication between senders and receivers must go through a third party called sanitizer.  ... 
doi:10.1016/j.ins.2019.01.074 fatcat:h2s6vnoidfbkrjb2krix73etrq

Secured Access and Security Issues of Maintenance for Cloud Database

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In order to make sure users that there data is in safe hands, cloud database are using more secured mechanism for accessing the cloud database.  ...  In order to achieve the goal of security we are using AES and honey encryption (HE) algorithm for strong authorization. Before authorization we need to have authentication of the users.  ...  External Layer This layer is used to provide services with full transparency and security.  Access Control Policy: Access policies should be maintained with high security because it provides access rights  ... 
doi:10.35940/ijitee.e2712.049620 fatcat:vzeqbyrwrjeplnp2unm3lttery

Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud

Siva Priya
2019 International Journal for Research in Applied Science and Engineering Technology  
The data are encrypted and the sensitive information's are hided before uploading in the cloud. Third Party Auditor (TPA) performs the auditing process in the cloud.  ...  It contains the confidential information that must be protected from unauthorized access. To provide the privacy for an individual or organization, the sensitive information's are need to be hided.  ...  Attribute-Based Encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption  ... 
doi:10.22214/ijraset.2019.5485 fatcat:sxjnkcz775gkretr3owfzmgamm

Strengthening Access Control Encryption [chapter]

Christian Badertscher, Christian Matt, Ueli Maurer
2017 Lecture Notes in Computer Science  
Correctness of an encryption scheme is typically not defined via a game with an adversary, but by requiring that decryption of an encryption of m yields m with probability 1.  ...  Access control encryption (ACE) was proposed by Damgård et al. to enable the control of information flow between several parties according to a given policy specifying which parties are, or are not, allowed  ...  Introduction Access Control Encryption -Model and Security Requirements The concept of access control encryption (ACE) was proposed by Damgård, Haagh, and Orlandi [DHO16 ] in order to enforce information  ... 
doi:10.1007/978-3-319-70694-8_18 fatcat:tzeartjqsfffraftemzxc5adle

MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme

Farhad Aghili, Mahdi Sedaghat, Dave Singelee, Maanak Gupta
2022 Zenodo  
Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data.  ...  Our construction is efficient and relies on a decryption outsourceable Ciphertext-Policy ABE scheme.  ...  Flanders with reference number VR20192203.  ... 
doi:10.5281/zenodo.5882163 fatcat:ky63vukw7fa4rmatosweyg7gx4

Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique

Rubin Thottupurathu Jose, Sojan Lal Poulose
2021 Advances in Science, Technology and Engineering Systems  
While receiving the index and trapdoor, the server verifies the access control structure that belongs to the attributes of user's trapdoor.  ...  The contents of documents are encrypted by the proposed method and enables to apply an access control policy.  ... 
doi:10.25046/aj060244 fatcat:bgcqyxyshncwbgnguspaxhrmpe

MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme

Farhad Aghili, Mahdi Sedaghat, Dave Singelee, Maanak Gupta
2022 Zenodo  
Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data.  ...  Our construction is efficient and relies on a decryption outsourceable Ciphertext-Policy ABE scheme.  ...  Besides, in the IoT networks, access control schemes should be energy-efficient.  ... 
doi:10.5281/zenodo.6024799 fatcat:ickfh5ie6nemvgtp5yjxt6x7je

Access Control Encryption for Equality, Comparison, and More [chapter]

Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
2017 Lecture Notes in Computer Science  
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to read but also what they are allowed to write.  ...  We instantiate our constructions based both on standard pairing assumptions (SXDH) or more efficiently in the generic group model.  ...  Introduction Access Control Encryption (ACE) is a novel paradigm for encryption that was introduced by Damgård, Haagh and Orlandi [DHO16] .  ... 
doi:10.1007/978-3-662-54388-7_4 fatcat:hhp4jbrlijh55d5qdax7rkrljq

A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique [chapter]

Pavithra R, Prathiksha S, Shruthi SG, Bhanumathi M
2021 Advances in Parallel Computing  
A further advantage of this method is we will be using encryption techniques to encrypt.  ...  This paper proposes a method that allows users to store and access the data securely from cloud storage. This method ensures the security and privacy of data stored on the cloud.  ...  Sanitizing files RSA encryption takes effect during this process (file sanitization), which assists in the creation of user keys to access the cloud.  ... 
doi:10.3233/apc210138 fatcat:bgswpkbh2bhijomtcouvnodinu
« Previous Showing results 1 — 15 out of 614 results