A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure data outsourcing scheme in cloud computing with attribute-based encryption
2018
International Journal of High Performance Computing and Networking
As an option, So, Attribute-Based Encryption (ABE) procedures are acquainted in the cloud with increment the security and adaptability. ...
In Identity-Based Encryption (IBE) the mystery key and the attributes are based on the character of the client. ...
CONCLUSIONS This paper abridges different attribute-based encryption systems for information security in cloud condition. ...
doi:10.1504/ijhpcn.2018.10015542
fatcat:zlub53bitfhurir2ejbgulkwje
AN EXTENSIVE STUDY TOWARDS ACHIEVING FINE GRAINED ACCESS CONTROL ON ENCRYPTED CLOUD DATA
2018
International Journal of Advanced Research in Computer Science
The proposed notion is used as key encapsulation mechanism to the data outsourced to cloud via third party application. ...
Outsourcing of business, Scientific and engineering data application on the Third party administrative cloud server have been increasing from the past decade. ...
Among many scheme Attribute based Encryption is used in large extent. ...
doi:10.26483/ijarcs.v9i3.6118
fatcat:5cg7ewgzbjemtdaojlsr7mm75e
Enhancing the Efficiency of Key Management Protocol in Attribute based Encryption for Cloud Data Sharing
2019
International Journal for Research in Applied Science and Engineering Technology
Keywords: cloud computing, Attribute based encryption cloud service provide, Cloud sharing. I. ...
ABE is the mechanism in which users are allowed to encrypt and decrypt data based on the attributes provided by the user. ...
In this paper they present a system for typical access control on encrypted data that we Attribute-Based Encryption. ...
doi:10.22214/ijraset.2019.6154
fatcat:6adyu2c2zvcsncxkk3tza2r45e
Survey Paper on Attribute Based Encryption & Decryption
2018
International Journal for Research in Applied Science and Engineering Technology
Attribute-based encryption (ABE). ...
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. ...
Attribute-Based Encryption with Verifiable Outsourced Decryption [Junzuo Lai, Robert H. ...
doi:10.22214/ijraset.2018.6145
fatcat:ed2dujlsmrch3d7cgpyiz7pxea
Analysis of attribute-based cryptographic techniques and their application to protect cloud services
2019
Transactions on Emerging Telecommunications Technologies
Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers. ...
In this paper, we provide a comparative analysis of different attribute based cryptographic mechanisms suitable for cloud data sharing services. we also provide a detailed discussion of different reviewed ...
Wang et al. 34 proposed an efficient file hierarchy attribute-based encryption scheme in cloud computing. ...
doi:10.1002/ett.3667
fatcat:eu7rs5halbefrmbiipbf6t7c7e
Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
2017
KSII Transactions on Internet and Information Systems
Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. ...
The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption ...
Proposed CP-ABE Scheme with Verifiable Outsourced Computation In this section, we first construct a CP-ABE scheme with outsourced encryption and decryption based on the scheme in [15] . ...
doi:10.3837/tiis.2017.06.024
fatcat:h3ex5kn5afeatb25gm6tf4lzca
An enhanced approach for data sharing security in cloud computing
2016
International Journal of Cloud Computing
In this paper, we give a new approach to enhance the security of data outsourced in cloud environment. The approach is based on Cipher Policy-Attribute Based Encryption (CP-ABE) scheme. ...
Building trust in providers it is not an easy task with an amount of outages and threats declared since adoption of cloud computing. ...
We propose a new method of applying CP-ABE scheme in cloud architecture with the target of improving security of shared data in cloud area. ...
doi:10.1504/ijcc.2016.080045
fatcat:wds2b5bo4nb2jpxjdvj6yxcbmq
Updating Policy with Access Control Using Multi Authority in the Cloud
2016
International Journal of Science and Research (IJSR)
Attribute Based Access Control method is used to avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access ...
A policy updating algorithm called LSSS is used for efficient and secure method allows data owner to check whether the cloud server has updated the cipher texts correctly. ...
Privacy Preserving Cloud Data Access With Multi-Authorities To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. ...
doi:10.21275/v5i2.26011602
fatcat:2sxmzle3oja5bb2ilbpz6fawvm
Attribute-Based Document Retrieval with Modified ARF Tree in Cloud Computing
2019
Zenodo
In this project, a hierarchical attribute-based encryption scheme is primarily designed for document collection. ...
Safe storage and retrieval of document is one of the mostsought after research directions in cloud computing. ...
PROPOSED SYSTEM A practical and realistichierarchical attribute-based document collection encryption scheme is in the make in which the documents are organized and controlled based on attributes. ...
doi:10.5281/zenodo.2597027
fatcat:szwo6jif3ndf3flx2buocduj4e
A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment
2020
Sensors
Recent developments in cloud computing allow data to be securely shared between users. ...
This paper focuses on the IoMT environment for a study of a CP-ABE-based medical data sharing system with key abuse prevention and verifiable outsourcing in a cloud environment. ...
Security Analysis • Verify data integrity: In our proposed scheme, the attribute-based encryption/decryption is not the message but the message encryption key, unlike existing schemes. ...
doi:10.3390/s20174934
pmid:32878202
pmcid:PMC7506716
fatcat:zuqhdxs2eveepntqo7h6gojeea
verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage
2020
International Journal of Engineering and Techniques
Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. ...
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. ...
In our scheme, we combine the verifiable of the correctness of outsourced private key with multi-keyword search based on attribute encryption. ...
doi:10.29126/23951303/ijet-v6i2p10
fatcat:ktzi7vpw5vh7lme7j2a5fzive4
Access Control in Fog Computing: Challenges and Research Agenda
2020
IEEE Access
Fog computing is an intermediate computing layer that has emerged to address the latency issues of cloud-based Internet of things (IoT) environments. ...
Many AC models have been implemented by researchers from academia and industry to address the problems associated with data breaches in pervasive computing environments. ...
In [11] , Sun et al. proposed an attribute-based searchable encryption scheme based on cloud-fog computing. ...
doi:10.1109/access.2020.2992460
fatcat:ksl7yrz3anac7kyjyv3s7hvwiq
Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption
[article]
2014
arXiv
pre-print
A promising application of ABE is flexible access control of encrypted data stored in the cloud using access policies and ascribed attributes associated with private keys and cipher text. ...
Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decry pt data based on user attributes. ...
Security intuition: As in previous attribute-based encryption schemes the main challenge in designing our scheme was to prevent against attacks from colluding users. ...
arXiv:1407.3660v1
fatcat:gcdrnkhkzbao3o5544exvkdmxe
Secure Health Information Exchanging in Cluster Computing
English
2014
International Journal of Computer Trends and Technology
English
Index Terms -Cloud computing, attribute based encryption, PHR, storage security I. ...
There scheme is named "Multi-Authority Attribute Based Encryption" which will encrypt the data based on attributes before being outsourced. ...
This paper is based on the Attributed Based Encryption (ABE) which is used to encrypt data before outsourcing it. The fined grained access control is based on the attributes and certain privileges. ...
doi:10.14445/22312803/ijctt-v8p101
fatcat:bldcfjf32reb5m46wymzmi4fya
Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service
[chapter]
2016
Lecture Notes in Computer Science
Policy update management is one of the key problems in the ciphertext policy-attribute-based encryption (CP-ABE) supporting access control in data outsourcing scenario. ...
In this paper, we extend the capability of our access control scheme: C-CP-ARBE to be capable to support secure and flexible policy updating in data outsourcing environment. ...
In [16] , the authors introduced adaptable CP-ABE scheme to handle policy changes in CP-ABE encryption for data outsourced in cloud computing. ...
doi:10.1007/978-3-319-44482-6_1
fatcat:uodcghaylbhuzcrnnes43jv4eq
« Previous
Showing results 1 — 15 out of 4,567 results