A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attribute based Encryption in Cloud Computing – A Review
2021
International Journal of Computer Applications
In this paper, Attribute Based Keyword Search over encrypted data in cloud are discussed which provides security over searching of data based on keyword. ...
Identity-Based Cryptography Identity-Based cryptography mechanism is used for securing cloud data using attribute-based approach. ...
Identity based Cryptography
Key Policy Attribute Based Encryption (KP-ABE) In KP-ABE approach, attribute policies are associated with keys and data is associated with attributes. ...
doi:10.5120/ijca2021921084
fatcat:xw6hkwy3pje4vejaj5g62smoy4
Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
2015
International Journal of Science and Research (IJSR)
ABE is a public-key based one to many encryption methodologies which allows users to encrypt and decrypt data based on user attributes. ...
To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. ...
Attribute Based Encryption (ABE) Few years later, Fuzzy Identity-Based Encryption [6] is proposed, which is also known as Attribute-Based Encryption (ABE). ...
doi:10.21275/v4i11.nov151519
fatcat:y66zekzkorfz3efh2byxm6b62u
Role Based Secured Access Of Data In Clouds
2017
Zenodo
A identity-based proxy re-encryption scheme has been used in order to provide a comprehensive and feasible solution for data centric-approach. ...
Attribute-based access control defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. ...
A data-centric approach is used for data self-protection, where novel cryptographic techniques such as Proxy Re-Encryption Identity-Based Encryption and Identity-Based Proxy Re-Encryption are used. ...
doi:10.5281/zenodo.438627
fatcat:pvziuhq6pjfgxc4yn2v6ifwaoy
A Novel Monarch Butterfly Optimization with Attribute based Encryption for Secure Public Cloud Storage
2021
Indian Journal of Computer Science and Engineering
Therefore, this paper presents a novel monarch butterfly optimization with attribute based encryption (MBO-ABE) technique for secure public cloud storage. ...
For improving the security performance of the ABE technique, the MBO manner is applied to it which is based on the migration of monarch butterflies. ...
Attribute-based encryption (ABE) is a common cryptographic method for protecting the security of user's data in CC. ...
doi:10.21817/indjcse/2021/v12i4/211204232
fatcat:uknqto5rfjfprfafu3kq5srh4m
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
2010
International Journal of Computational Models and Algorithms in Medicine
In this paper we propose a new encryption technique called a type-and-identity-based proxy reencryption scheme which is suitable to be used in the healthcare setting. ...
This implies that data remains confidential even if the database maintained by the third party is compromised. ...
We propose a type-and-identity-based proxy re-encryption scheme which consists of six algorithms : Setup , Extract , Encrypt , Pextract ,
Figure 2: Identity-Based Encryption Identity-Based Encryption ...
doi:10.4018/jcmam.2010040101
fatcat:sdcgkt24tjf5rc5ovxxknotaru
Secure Sharing Of Data In Cloud Using Attribute Based Proxy Re-Encryption
2016
Zenodo
The objective of this project is to provide security in Cloud storage by using Attribute based proxy re-encryption which can be applicable to many real world applications. ...
We showed that PEKS implies Identity Based Encryption, currently an open problem. Our constructions for PEKS are based on recent IBE constructions. ...
four steps scheme where the algorithms are,(1) Setup.( 2 ) Private key Generation (3) Encryption (4) Decryption .In fuzzylogic identity based encryption view identities as a set of attributes. ...
doi:10.5281/zenodo.51466
fatcat:tjn52gk2uzd4hjohgsuoyiyp7q
Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing
2021
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Unfortunately, when sharing the data in a group while preserving data, identity privacy is still a challenging issue due to frequent change in membership. ...
The storage overhead and encryption computation cost are dependent on the number of revoked users. ...
This imply that revocation of any
attribute or any single user in an quality group would
We proposed a secure provenance scheme based on
the ciphertext-policy attribute-based encryption
technique ...
doi:10.32628/cseit2172846
fatcat:dfkinzufdra7pbhkzug4hhievy
Secure Data Retrieval based on Attribute-based Encryption in Cloud
2016
International Journal of Computer Applications
Attribute based encryption policy provides efficient encryption of data. ...
This paper describes the implementation of Hierarchical attribute base encryption scheme on cloudsim tool. Implementing attribute based encryption where rijndael algorithm used to encrypt data. ...
Attribute based encryption was initially introduced by Sahai and waters [3] , it was new method which used fuzzy identity based encryption .In the ABE scheme, in with ciphertexts are never encrypted to ...
doi:10.5120/ijca2016908166
fatcat:6xrjbgkbe5dvjbm6thbnpe7gau
Remarks on the Cryptographic Primitive of Attribute-based Encryption
[article]
2014
arXiv
pre-print
Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based on user attributes is a type of one-to-many encryption. ...
Unlike the conventional one-to-one encryption which has no intention to exclude any partners of the intended receiver from obtaining the plaintext, an ABE system tries to exclude some unintended recipients ...
There are two type of attribute-based encryptions, ciphertext-policy attribute-based encryption (CP-ABE) and key-policy attribute-based encryption (KP-ABE). ...
arXiv:1408.4846v1
fatcat:y2pjpc3pqnchlio7meyvb5plgu
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
2014
International Journal of Computer Applications
Although traditional attribute based encryption technique allow users to securely search the data by using keywords, they support only Boolean search and are not yet sufficient to meet the effective data ...
However, to protect the secret data, sensitive information in cloud first the data has to be encrypted before outsourced to the commercial public cloud. It is a very challenging task. ...
Attribute-Based Encryption (ABE) Attribute-based encryption [8] was firstly introduced by Sahai and Waters, in which they suggested that one's identity can be viewed as a combination of several attributes ...
doi:10.5120/15873-4885
fatcat:kgkheag6qjemvcukgmlj5ph26a
Function-Private Subspace-Membership Encryption and Its Applications
[chapter]
2013
Lecture Notes in Computer Science
While Boneh et al. showed how to construct function-private identity-based encryption (which implies predicate-private encrypted keyword search), searchable encryption typically requires a richer set of ...
Among our applications, we significantly improve the function privacy of the identity-based encryption schemes of Boneh et al.: whereas their schemes are function private only for identities that are highly ...
They presented a framework for modeling function privacy, and constructed various function-private anonymous identity-based encryption schemes (which, in particular, imply public-key keyword-private searchable ...
doi:10.1007/978-3-642-42033-7_14
fatcat:jta3wmrqtre53fyyas5tieb5tq
Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption
2015
Indian Journal of Science and Technology
Ciphertext Policy Attribute Based Encryption is a proficient technique for addressing this security issue, in which the owner of the data will create a control structure for encrypting the information. ...
Decryption is possible when the peculiar attributes of the users satisfies that access control tree. Private keys for the users will be generated based on the attributes of the users. ...
ABE is developed based on the stimulus of IBE 7 (Identity Based Encryption) which is otherwise called as Fuzzy IBE. ...
doi:10.17485/ijst/2015/v8is9/65600
fatcat:bzafk7nkmvd37idn44zrekheby
Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey
2017
International Journal of Computer Applications
privacy, robustness and access control.In this paper the proxy re-encryption(PRE) schemes, Conditional PRE,Identity based PRE and Broadcast PRE,Type based PRE, Key private PRE,Attribute based PRE,Threshold ...
There are many encryption schemes that provide security and access control over the network.Proxy re-encryption enables the semi-trusted proxy server to re-encrypt the ciphertext encrypted under Alice's ...
Attribute based encryption is a generalized form of IBE.Two types of attribute based encryption (ABE) namely ciphertext policy attribute based encryption (CP-ABE) and key policy attribute based encryption ...
doi:10.5120/ijca2017913642
fatcat:ebvslla3v5du5bzytodxwpygsm
Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes
2014
International Journal of Advanced Computer Science and Applications
In this paper we evaluate certain Identity-Based and Attribute-Based Encryption schemes and provide detailed analysis on performance. ...
Keywords-multi-tenancy; audit-trail log; attribute-based encryption; reverse proxy security I. ...
Later attribute based encryption was extended to distributed identities and hierarchical attribute based encryption schemes. ...
doi:10.14569/ijacsa.2014.051120
fatcat:grd45idsj5dffff3kczh7c4iva
Functional Encryption and Its Impact on Cryptography
[chapter]
2014
Lecture Notes in Computer Science
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained access control and selective computation on encrypted data, as is necessary to protect big, complex data ...
In this article, we provide a brief introduction to functional encryption, and an overview of its overarching impact on the field of cryptography. ⋆ wee@di.ens.fr. CNRS (UMR 8548) and INRIA. ...
Together, attribute-based and functional encryption constitute a crisp generalization of several advanced notions of encryption, such as broadcast and identity-based encryption as well as searching on ...
doi:10.1007/978-3-319-10879-7_18
fatcat:xpqhqqqjcnaddkdqwcvjpzcztu
« Previous
Showing results 1 — 15 out of 18,464 results