A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Access Control Encryption: Enforcing Information Flow with Cryptography
[article]
2016
arXiv
pre-print
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users not only in terms of which ...
Our contributions are: - Introducing and formally defining access control encryption (ACE); - A construction of ACE with complexity linear in the number of the roles based on classic number theoretic assumptions ...
Access Control Encryption: The Problem it Solves Senders and Receivers. ...
arXiv:1602.03642v2
fatcat:bnzj2wqd5bdanofgukihmjb24a
A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
If the match occurs, automatically file would be recovered by the user even if hacker access or tamper the file. ...
Data sharing can be achieved with sensitive information hiding with remote data integrity auditing, propose a new concept called identity based shared data integrity auditing with sensitive information ...
In the phase of integrity auditing, signatures are used to verify the integrity of the sanitized file. ...
doi:10.35940/ijitee.a1019.1191s19
fatcat:lxdc7ufngbhj5hlga23wrbttzm
Access Control Encryption: Enforcing Information Flow with Cryptography
[chapter]
2016
Lecture Notes in Computer Science
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users not only in terms of which ...
Our contributions are: -Introducing and formally defining access control encryption (ACE); -A construction of ACE with complexity linear in the number of the roles based on classic number theoretic assumptions ...
Access Control Encryption: The Problem it Solves Senders and Receivers. ...
doi:10.1007/978-3-662-53644-5_21
fatcat:bfbriddj75hc5lwyn67dtwedly
Privacy and Security Aware Cloud Storage using Double Cryptography Method
2019
International journal of recent technology and engineering
The principle applied to the proposed methodology is double encryption and double decryption. The encrypted files are decrypted to view the original data using the keys. ...
In this paper, we proposed an improved double encryption-decryption (IDED) method for a secure cloud system. ...
This method encloses with efficient key management and access permissions systems. It segmented before encryption on decryption correction combination gives a successful result. ...
doi:10.35940/ijrte.d1108.1284s219
fatcat:l6tb23qvwndrxinv4ybshw6mvu
Third-party enabled auditing for uniqueness-based integrity and data sharing with information hiding
2022
International Journal of Health Sciences
An efficient auditing system to determine whether or not the data is corrupted is a challenging task among the recent research. ...
The record blocks that report sensitive data are sanitized, and the signatures of those records blocks are converted into legitimate ones for the sanitized report. ...
Implementation of Blind and sanitize algorithm Advanced Encryption Standards (AES) is one of the most extensively used encryption and decryption technologies. ...
doi:10.53730/ijhs.v6ns2.7373
fatcat:2hzbtcyte5gvreheaapvge6bme
Cross-Domain Attribute-Based Access Control Encryption
[article]
2021
IACR Cryptology ePrint Archive
At TCC 2016, Damgård et al. proposed Access Control Encryption (ACE) schemes where a predicate function decides whether or not users can read (decrypt) and write (encrypt) data, while the message secrecy ...
Moreover, we propose an efficient scheme in which the sizes of ciphertexts and encryption and decryption keys are constant and thus independent of the number of receivers and their attributes. ...
Research Flanders with reference number VR20192203. ...
dblp:journals/iacr/SedaghatP21
fatcat:2fdmrmbn3bghfd67iyxrpnwp3a
Fine-Grained Information Flow Control Using Attributes
2019
Information Sciences
To enhance IFC, access control encryption (ACE) was proposed where both the no write-down rule and the no read-up rule are supported. ...
the number of required * Corresponding author. attributes or receivers; (3) weak attribute privacy is achieved; (4) fine-grained access policies on encrypted data are supported; (5) the communication ...
[14] , access control encryption (ACE) is a new public-key encryption scheme where all communication between senders and receivers must go through a third party called sanitizer. ...
doi:10.1016/j.ins.2019.01.074
fatcat:h2s6vnoidfbkrjb2krix73etrq
Secured Access and Security Issues of Maintenance for Cloud Database
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In order to make sure users that there data is in safe hands, cloud database are using more secured mechanism for accessing the cloud database. ...
In order to achieve the goal of security we are using AES and honey encryption (HE) algorithm for strong authorization. Before authorization we need to have authentication of the users. ...
External Layer This layer is used to provide services with full transparency and security. Access Control Policy: Access policies should be maintained with high security because it provides access rights ...
doi:10.35940/ijitee.e2712.049620
fatcat:vzeqbyrwrjeplnp2unm3lttery
Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud
2019
International Journal for Research in Applied Science and Engineering Technology
The data are encrypted and the sensitive information's are hided before uploading in the cloud. Third Party Auditor (TPA) performs the auditing process in the cloud. ...
It contains the confidential information that must be protected from unauthorized access. To provide the privacy for an individual or organization, the sensitive information's are need to be hided. ...
Attribute-Based Encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption ...
doi:10.22214/ijraset.2019.5485
fatcat:sxjnkcz775gkretr3owfzmgamm
Strengthening Access Control Encryption
[chapter]
2017
Lecture Notes in Computer Science
Correctness of an encryption scheme is typically not defined via a game with an adversary, but by requiring that decryption of an encryption of m yields m with probability 1. ...
Access control encryption (ACE) was proposed by Damgård et al. to enable the control of information flow between several parties according to a given policy specifying which parties are, or are not, allowed ...
Introduction
Access Control Encryption -Model and Security Requirements The concept of access control encryption (ACE) was proposed by Damgård, Haagh, and Orlandi [DHO16 ] in order to enforce information ...
doi:10.1007/978-3-319-70694-8_18
fatcat:tzeartjqsfffraftemzxc5adle
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme
2022
Zenodo
Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data. ...
Our construction is efficient and relies on a decryption outsourceable Ciphertext-Policy ABE scheme. ...
Flanders with reference number VR20192203. ...
doi:10.5281/zenodo.5882163
fatcat:ky63vukw7fa4rmatosweyg7gx4
Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique
2021
Advances in Science, Technology and Engineering Systems
While receiving the index and trapdoor, the server verifies the access control structure that belongs to the attributes of user's trapdoor. ...
The contents of documents are encrypted by the proposed method and enables to apply an access control policy. ...
doi:10.25046/aj060244
fatcat:bgcqyxyshncwbgnguspaxhrmpe
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme
2022
Zenodo
Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data. ...
Our construction is efficient and relies on a decryption outsourceable Ciphertext-Policy ABE scheme. ...
Besides, in the IoT networks, access control schemes should be energy-efficient. ...
doi:10.5281/zenodo.6024799
fatcat:ickfh5ie6nemvgtp5yjxt6x7je
Access Control Encryption for Equality, Comparison, and More
[chapter]
2017
Lecture Notes in Computer Science
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to read but also what they are allowed to write. ...
We instantiate our constructions based both on standard pairing assumptions (SXDH) or more efficiently in the generic group model. ...
Introduction Access Control Encryption (ACE) is a novel paradigm for encryption that was introduced by Damgård, Haagh and Orlandi [DHO16] . ...
doi:10.1007/978-3-662-54388-7_4
fatcat:hhp4jbrlijh55d5qdax7rkrljq
A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique
[chapter]
2021
Advances in Parallel Computing
A further advantage of this method is we will be using encryption techniques to encrypt. ...
This paper proposes a method that allows users to store and access the data securely from cloud storage. This method ensures the security and privacy of data stored on the cloud. ...
Sanitizing files RSA encryption takes effect during this process (file sanitization), which assists in the creation of user keys to access the cloud. ...
doi:10.3233/apc210138
fatcat:bgswpkbh2bhijomtcouvnodinu
« Previous
Showing results 1 — 15 out of 614 results