Filters








953 Hits in 3.4 sec

Server-Aided Revocable Attribute-Based Encryption from Lattices

Xingting Dong, Yanhua Zhang, Baocang Wang, Jiangshan Chen
2020 Security and Communication Networks  
In this work, we propose the first lattice-based server-aided revocable attribute-based encryption (SR-ABE) scheme and thus the first such construction that is believed to be quantum resistant.  ...  Attribute-based encryption (ABE) can support a fine-grained access control to encrypted data.  ...  Figure 1 : 1 Framework of server-aided revocable attribute-based encryption.  ... 
doi:10.1155/2020/1460531 fatcat:6kevau6x5baivlri5wt2fyjtnu

Server‐aided revocable attribute‐based encryption for cloud computing services

Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang
2020 Concurrency and Computation  
Server-aided revocable attribute-based encryption for cloud Server-aided revocable attribute-based encryption for cloud computing services computing services and WANG, Guilin.  ...  Server-aided revocable attribute-based encryption for cloud computing services. (2020). Concurrency and Computation: Practice and Experience. Research Collection School Of Information Systems.  ...  [11] proposed a server-aided revocable attribute-based encryption (SR-ABE) scheme.  ... 
doi:10.1002/cpe.5680 fatcat:makbgup6ynb67ezvvdyyo4lwxq

An Efficient and Secure Solution for Attribute Revocation Problem Utilizing CP-ABE Scheme in Mobile Cloud Computing

Vijay H., Dinesh Goyal, Sanjay Singla
2015 International Journal of Computer Applications  
To solve the issue, ABE or Attribute Based Encryption techniques are employed as they are vastly recognized as a valid and robust mechanism to provide fine access control over the data to legitimate users  ...  As revocation of user rights requires the system to secure data from moved out users, rekeying has to be done on entire data set belonging to that attribute users in the group.  ...  With regard to revocation of the attribute in Attribute-Based Encryption, an easy and simple revocation mechanism was introduced in [25] to attain scalable as well as fine-grained access control.  ... 
doi:10.5120/ijca2015906807 fatcat:s2fmptzxxvayxofpsvbgmirlcq

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Kan Yang, Xiaohua Jia
2014 IEEE Transactions on Parallel and Distributed Systems  
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on  ...  Our attribute revocation method can efficiently achieve both forward security and backward security.  ...  To achieve revocation on attribute level, some reencryption-based attribute revocation schemes [9] , [11] are proposed by relying on a trusted server.  ... 
doi:10.1109/tpds.2013.253 fatcat:xmaiieljjra5zcrttypohbeeey

DAC-MACS: Effective data access control for multi-authority cloud storage systems

Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang
2013 2013 Proceedings IEEE INFOCOM  
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data.  ...  Existing access control schemes are no longer applicable to cloud storage systems, because they either produce multiple encrypted copies of the same data or require a fully trusted cloud server.  ...  The server also does the ciphertext update when an attribute revocation happens.  ... 
doi:10.1109/infcom.2013.6567100 dblp:conf/infocom/YangJRZ13 fatcat:4ihzxlhbb5artpgbm352nosarq

Different access control methods with revocationin multi-authority cloud

K. V. V. Satyanarayana, J. Mahathi, V. V. R. Srikar, S.K. Sai Babu
2017 International Journal of Engineering & Technology  
Multiple security techniques are being implemented.Attribute based security is one of the concepts especially for basics of the cipher-text based, but the user's attributes were given by the multiple authorities  ...  In this, we will see why the cipher-text based is important and different security models with the multi-authority with the revocation in the different levels in the security models.  ...  With respect to attribute based there are two composes: Key-policy attribute based encryption (KP-ABE) and cipher-text policy attribute based encryption (CP-ABE).  ... 
doi:10.14419/ijet.v7i1.1.9713 fatcat:ays5cjq5f5ey7out7p5tkmp47m

Attributed-Based Access Control for Multi-authority Systems in Cloud Storage

Kan Yang, Xiaohua Jia
2012 2012 IEEE 32nd International Conference on Distributed Computing Systems  
Ciphertext-Policy Attribute-base Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage.  ...  We also propose a new technique to solve the attribute revocation problem in multi-authority CP-ABE systems.  ...  To improve the efficiency of attribute revocation, we move the work of re-encrypting the ciphertext to the server by using proxy encryption method, such that there is no need for the server to decrypt  ... 
doi:10.1109/icdcs.2012.42 dblp:conf/icdcs/YangJ12 fatcat:qmle6fdx65a4zjsordaay6tuyy

Efficient Access Control and Security for Multi-Authority Cloud Storage Server

Sampath Kumar Tatipally, Dr. K. Shahu Chatrapathi
2017 International Journal of Trend in Scientific Research and Development  
It is somewhat difficult to apply existing Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme to cloud data access control because of the attribute revocation problem.  ...  Our revocation attribute method can efficiently achieve both backward security and forward security.  ...  To achieve the revocation on attribute level, for this encryption based attribute revocation schemes are proposed by relying on a trusted server.  ... 
doi:10.31142/ijtsrd4599 fatcat:xro4dy7evrbzvaht7bsx73r37i

Fully Secure and Efficient Data Sharing with Attribute Revocation for Multi-Owner Cloud Storage

Hari Baskar
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
Cipher text-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on  ...  In addition, this project propose method based on probabilistic query and periodic verification for improving the performance of audit services.  ...  Definition: A multi-authority attribute revocable ciphertextpolicy attribute-based encryption scheme is secure if all polynomial time adversaries have at most a negligible advantage in the above game.  ... 
doi:10.17762/ijritcc2321-8169.150287 fatcat:t6wyd6nh5veafdidkpkpczfm4q

DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems

Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie
2013 IEEE Transactions on Information Forensics and Security  
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data.  ...  Existing access control schemes are no longer applicable to cloud storage systems, because they either produce multiple encrypted copies of the same data or require a fully trusted cloud server.  ...  However, these methods either only support the user level revocation or rely on the server to conduct the attribute revocation.  ... 
doi:10.1109/tifs.2013.2279531 fatcat:f5uj6y7awzhftnaaj6ezghfvxa

DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems [chapter]

Kan Yang, Xiaohua Jia
2013 SpringerBriefs in Computer Science  
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data.  ...  Existing access control schemes are no longer applicable to cloud storage systems, because they either produce multiple encrypted copies of the same data or require a fully trusted cloud server.  ...  However, these methods either only support the user level revocation or rely on the server to conduct the attribute revocation.  ... 
doi:10.1007/978-1-4614-7873-7_4 fatcat:xga6xi7dfrbjxp3jbt6jhphfke

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

2015 International Journal of Science and Research (IJSR)  
It aims to allow the users with eligible attributes to decrypt the entire data stored in the cloud server.  ...  In the existing work an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems is proposed to support the authority access control get from the many attribute  ...  Lou, worked on "Attribute Based Data Sharing with Attribute Revocation,"". This paper use semi-trustable on-line proxy servers.  ... 
doi:10.21275/v4i12.nov152031 fatcat:jymygdiyu5ajfjwbovqrea33wa

Achieving Scalable and Optimized Attribute Revocation in Cloud Computing

Somchart FUGKEAW, Hiroyuki SATO
2017 IEICE transactions on information and systems  
To this end, we propose three-phase VL-PRE protocol including re-encryption key generation, re-encryption key update, and re-encryption key renewal for supporting the optimized attribute revocation and  ...  The revocation in the cloud-based access control typically deals with the cryptographic operations that introduce costly overheads for key re-generation, file reencryption, and key re-distribution.  ...  than attribute-based encryption.  ... 
doi:10.1587/transinf.2016ntp0006 fatcat:ika57zv53rbxvgtwrpgfowbrti

Shielding of Data Access Control for Multiauthority Cloud Storage Systems using Advanced Encryption Standard

2017 International Journal of Science and Research (IJSR)  
AES is an assuring method that provides access control of encrypted data and provides more secure attribute revocation.  ...  The existing access control policies cannot be applied further as they either produce multiple encrypted copies of the same data or it requires a fully trusted cloud server.  ...  Related Work Data access control systems based on cipher text policy attribute-based encryption (CP-ABE) are efficient, fine grained and revocable access schemes [3] .  ... 
doi:10.21275/art2017684 fatcat:nrbon2g6djdfhiswx573irchkm

Attribute-Based Encryption with Granular Revocation [chapter]

Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Attribute-based encryption (ABE) enables an access control mechanism over encrypted data by specifying access policies over attributes associated with private keys or ciphertexts, which is a promising  ...  Then, to further improve the efficiency, we present a server-aided ABE-GR scheme, where an untrusted server is introduced to the system to mitigate data users' workloads during the key update phase.  ...  , which we call attribute-based encryption with granular revocation (ABE-GR).  ... 
doi:10.1007/978-3-319-59608-2_9 fatcat:uryh3eddtveytpxvhfaoptdjrq
« Previous Showing results 1 — 15 out of 953 results