Filters








4,567 Hits in 3.3 sec

Secure data outsourcing scheme in cloud computing with attribute-based encryption

Shuaishuai Zhu, Yiliang Han
2018 International Journal of High Performance Computing and Networking  
As an option, So, Attribute-Based Encryption (ABE) procedures are acquainted in the cloud with increment the security and adaptability.  ...  In Identity-Based Encryption (IBE) the mystery key and the attributes are based on the character of the client.  ...  CONCLUSIONS This paper abridges different attribute-based encryption systems for information security in cloud condition.  ... 
doi:10.1504/ijhpcn.2018.10015542 fatcat:zlub53bitfhurir2ejbgulkwje

AN EXTENSIVE STUDY TOWARDS ACHIEVING FINE GRAINED ACCESS CONTROL ON ENCRYPTED CLOUD DATA

M. Amsaveni
2018 International Journal of Advanced Research in Computer Science  
The proposed notion is used as key encapsulation mechanism to the data outsourced to cloud via third party application.  ...  Outsourcing of business, Scientific and engineering data application on the Third party administrative cloud server have been increasing from the past decade.  ...  Among many scheme Attribute based Encryption is used in large extent.  ... 
doi:10.26483/ijarcs.v9i3.6118 fatcat:5cg7ewgzbjemtdaojlsr7mm75e

Enhancing the Efficiency of Key Management Protocol in Attribute based Encryption for Cloud Data Sharing

Priya Chaturvedi
2019 International Journal for Research in Applied Science and Engineering Technology  
Keywords: cloud computing, Attribute based encryption cloud service provide, Cloud sharing. I.  ...  ABE is the mechanism in which users are allowed to encrypt and decrypt data based on the attributes provided by the user.  ...  In this paper they present a system for typical access control on encrypted data that we Attribute-Based Encryption.  ... 
doi:10.22214/ijraset.2019.6154 fatcat:6adyu2c2zvcsncxkk3tza2r45e

Survey Paper on Attribute Based Encryption & Decryption

Pooja Prajapati
2018 International Journal for Research in Applied Science and Engineering Technology  
Attribute-based encryption (ABE).  ...  Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based.  ...  Attribute-Based Encryption with Verifiable Outsourced Decryption [Junzuo Lai, Robert H.  ... 
doi:10.22214/ijraset.2018.6145 fatcat:ed2dujlsmrch3d7cgpyiz7pxea

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
2019 Transactions on Emerging Telecommunications Technologies  
Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers.  ...  In this paper, we provide a comparative analysis of different attribute based cryptographic mechanisms suitable for cloud data sharing services. we also provide a detailed discussion of different reviewed  ...  Wang et al. 34 proposed an efficient file hierarchy attribute-based encryption scheme in cloud computing.  ... 
doi:10.1002/ett.3667 fatcat:eu7rs5halbefrmbiipbf6t7c7e

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

2017 KSII Transactions on Internet and Information Systems  
Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases.  ...  The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption  ...  Proposed CP-ABE Scheme with Verifiable Outsourced Computation In this section, we first construct a CP-ABE scheme with outsourced encryption and decryption based on the scheme in [15] .  ... 
doi:10.3837/tiis.2017.06.024 fatcat:h3ex5kn5afeatb25gm6tf4lzca

An enhanced approach for data sharing security in cloud computing

Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour
2016 International Journal of Cloud Computing  
In this paper, we give a new approach to enhance the security of data outsourced in cloud environment. The approach is based on Cipher Policy-Attribute Based Encryption (CP-ABE) scheme.  ...  Building trust in providers it is not an easy task with an amount of outages and threats declared since adoption of cloud computing.  ...  We propose a new method of applying CP-ABE scheme in cloud architecture with the target of improving security of shared data in cloud area.  ... 
doi:10.1504/ijcc.2016.080045 fatcat:wds2b5bo4nb2jpxjdvj6yxcbmq

Updating Policy with Access Control Using Multi Authority in the Cloud

2016 International Journal of Science and Research (IJSR)  
Attribute Based Access Control method is used to avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access  ...  A policy updating algorithm called LSSS is used for efficient and secure method allows data owner to check whether the cloud server has updated the cipher texts correctly.  ...  Privacy Preserving Cloud Data Access With Multi-Authorities To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently.  ... 
doi:10.21275/v5i2.26011602 fatcat:2sxmzle3oja5bb2ilbpz6fawvm

Attribute-Based Document Retrieval with Modified ARF Tree in Cloud Computing

G. Sabarisuganya, P. Sathyasutha
2019 Zenodo  
In this project, a hierarchical attribute-based encryption scheme is primarily designed for document collection.  ...  Safe storage and retrieval of document is one of the mostsought after research directions in cloud computing.  ...  PROPOSED SYSTEM A practical and realistichierarchical attribute-based document collection encryption scheme is in the make in which the documents are organized and controlled based on attributes.  ... 
doi:10.5281/zenodo.2597027 fatcat:szwo6jif3ndf3flx2buocduj4e

A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment

Yong-Woon Hwang, Im-Yeong Lee
2020 Sensors  
Recent developments in cloud computing allow data to be securely shared between users.  ...  This paper focuses on the IoMT environment for a study of a CP-ABE-based medical data sharing system with key abuse prevention and verifiable outsourcing in a cloud environment.  ...  Security Analysis • Verify data integrity: In our proposed scheme, the attribute-based encryption/decryption is not the message but the message encryption key, unlike existing schemes.  ... 
doi:10.3390/s20174934 pmid:32878202 pmcid:PMC7506716 fatcat:zuqhdxs2eveepntqo7h6gojeea

verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage

dr.e.punarselvam null, m.dhamodaran null, m.saravanan null, s.sasidharan null, s.sreedhar null, k.vignesh null
2020 International Journal of Engineering and Techniques  
Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing.  ...  The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature.  ...  In our scheme, we combine the verifiable of the correctness of outsourced private key with multi-keyword search based on attribute encryption.  ... 
doi:10.29126/23951303/ijet-v6i2p10 fatcat:ktzi7vpw5vh7lme7j2a5fzive4

Access Control in Fog Computing: Challenges and Research Agenda

Mohammed Aleisa, Abdullah Abuhussein, Frederick T. Sheldon
2020 IEEE Access  
Fog computing is an intermediate computing layer that has emerged to address the latency issues of cloud-based Internet of things (IoT) environments.  ...  Many AC models have been implemented by researchers from academia and industry to address the problems associated with data breaches in pervasive computing environments.  ...  In [11] , Sun et al. proposed an attribute-based searchable encryption scheme based on cloud-fog computing.  ... 
doi:10.1109/access.2020.2992460 fatcat:ksl7yrz3anac7kyjyv3s7hvwiq

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption [article]

Charan Kumar, Dinesh Kumar, Arun Kumar Reddy
2014 arXiv   pre-print
A promising application of ABE is flexible access control of encrypted data stored in the cloud using access policies and ascribed attributes associated with private keys and cipher text.  ...  Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decry pt data based on user attributes.  ...  Security intuition: As in previous attribute-based encryption schemes the main challenge in designing our scheme was to prevent against attacks from colluding users.  ... 
arXiv:1407.3660v1 fatcat:gcdrnkhkzbao3o5544exvkdmxe

Secure Health Information Exchanging in Cluster Computing
English

Satish Garigipati, Manoj Kumar Gottimukala
2014 International Journal of Computer Trends and Technology  
Index Terms -Cloud computing, attribute based encryption, PHR, storage security I.  ...  There scheme is named "Multi-Authority Attribute Based Encryption" which will encrypt the data based on attributes before being outsourced.  ...  This paper is based on the Attributed Based Encryption (ABE) which is used to encrypt data before outsourcing it. The fined grained access control is based on the attributes and certain privileges.  ... 
doi:10.14445/22312803/ijctt-v8p101 fatcat:bldcfjf32reb5m46wymzmi4fya

Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service [chapter]

Somchart Fugkeaw, Hiroyuki Sato
2016 Lecture Notes in Computer Science  
Policy update management is one of the key problems in the ciphertext policy-attribute-based encryption (CP-ABE) supporting access control in data outsourcing scenario.  ...  In this paper, we extend the capability of our access control scheme: C-CP-ARBE to be capable to support secure and flexible policy updating in data outsourcing environment.  ...  In [16] , the authors introduced adaptable CP-ABE scheme to handle policy changes in CP-ABE encryption for data outsourced in cloud computing.  ... 
doi:10.1007/978-3-319-44482-6_1 fatcat:uodcghaylbhuzcrnnes43jv4eq
« Previous Showing results 1 — 15 out of 4,567 results