A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing
International Research Journal of Engineering and Technology (IRJET)
unpublished
In this paper an efficient file hierarchy attribute based encryption scheme is proposed. ...
There are many encryption technologies used to share data securely. One of the best ways is CP-ABE is to solve challenging problem of secure data sharing scheme in cloud computing. ...
In this study, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short). ...
fatcat:apighp62bbc7zes4yzka65i6am
Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
2020
Procedia Computer Science
This paper proposes an efficient multi-authority access control using attribute-based encryption scheme that achieves efficient, fine grained access control. ...
This paper proposes an efficient multi-authority access control using attribute-based encryption scheme that achieves efficient, fine grained access control. ...
The efficiency and security of proposed scheme is measured by considering time consumption of encryption and decryption over 100 users, 20 attributes, 150 files (in MB of varying size) and 20 authorities ...
doi:10.1016/j.procs.2020.03.423
fatcat:okyp62ij2zgblord4znx3pmyki
An Improved Security enabled Distribution of Protected Cloud Storage Services by Zero-Knowledge Proof based on RSA Assumption
2012
International Journal of Computer Applications
In hierarchical identity-based architecture, the sender needs to encrypt a file only once and store only one copy of the corresponding ciphertext in a cloud. ...
The efficient sharing of secure cloud storage services (ESC) scheme which allows the upper-level user to share the secure cloud storage services with multiple lower-level users. ...
The concept of existing Attribute Based Encryption (ABE) [2] [6] [7] schemes can enable a sender to encrypt a message to multiple recipients in an efficient way. ...
doi:10.5120/4952-7198
fatcat:kuq73tbq4jg27nqprduiaih4p4
An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
2012
Bonfring International Journal of Research in Communication Engineering
An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages in hierarchical order. ...
This scheme allows the sender to participate in the partial signature, so as to reduce the computational cost. ...
Liu et al., [15] described about an efficient privacy preserving keyword search scheme in cloud computing. ...
doi:10.9756/bijrce.1504
fatcat:naghlqgk3vblxaiuzq537mw23i
A Review on Access Control Policy and Key Generation in Data Sharing
2019
International Journal of Advanced Engineering Research and Science
An Efficient File Hierarchy Attribute-Based Encryption Scheme: In this article, an efficient file hierarchy attribute-based encryption scheme is proposed [15] . ...
In this study, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short). ...
doi:10.22161/ijaers.6.2.6
fatcat:jghs5et6lbhxxjgd7e2c2d2cve
Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
2022
Computer systems science and engineering
Furthermore, highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes (revocation) storage identity-based ...
Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. ...
Lastly, computation efficiency is computed for the proposed system; it takes 23 sec in terms of attributes and 32 sec in terms of files. ...
doi:10.32604/csse.2022.019508
fatcat:nzq5lyfcozco5eapu3q6ywziwq
HASBE access control model with Secure Key Distribution and Efficient Domain Hierarchy for cloud computing
2016
International Journal of Electrical and Computer Engineering (IJECE)
So encryption based on Attribute ("ABE"-"Attribute based encryption") has been offered for access control of subcontracted data in cloud computing with complex access control policies. ...
In this paper, we had enhanced "Hierarchical attribute-set-based encryption" ("HASBE") access control with a hierarchical assembly of users, with flexible domain Hierarchy structure and Secure key distribution ...
In "attribute based encryption" (ABE) scheme the data owner has to use user's PK ("Public Key") to encrypt data. ...
doi:10.11591/ijece.v6i2.8919
fatcat:3yv73zauevarbisn64jvtaqaee
Role Based Encryption with Efficient Access Control in Cloud Storage
2016
International Journal of Science and Research (IJSR)
In this paper, a practical RBAC (Role Based Access Control) model is proposed to hold various security features like encryption, role management, role hierarchy, etc. ...
RBAC is the method of coordinating access to computer according to individual roles of the user in an enterprise. ...
CACH (Content Access Control in Hierarchy) Independent and dependent key approaches are included in this scheme. To encrypt the data there is no need of encryption key. ...
doi:10.21275/v5i2.nov161454
fatcat:niuvrs6yabcnvoe4nxyna2qb4m
Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud
2019
International Journal for Research in Applied Science and Engineering Technology
This scheme makes the file stored in the cloud able to be shared and used by others on the condition that the sensitive information is hidden, which makes the auditing system to work in efficient manner ...
Authorizing based on Identity-based cloud storage auditing schemes can check the security of cloud data. It contains the confidential information that must be protected from unauthorized access. ...
However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. ...
doi:10.22214/ijraset.2019.5485
fatcat:sxjnkcz775gkretr3owfzmgamm
A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing
2015
Journal of Telematics and Informatics
That's why the reason traditional access control is not enough For the High security .so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing ...
with the complex access control policy.in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption ...
security so that various Attribute based Encryption Scheme are proposed ...
doi:10.12928/jti.v3i1.22-27
fatcat:npbuzf63vrblrpymgqh2ttwcle
An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing
2018
International Journal of Trend in Scientific Research and Development
Then the patient adopts CP-ABE scheme to encrypt the information m1 and m2 by different access policies based on the actual need. Also we propose The Clinical Document Architecture (CDA). ...
They collect the real time personal information (PHI) and patient's physical problem and transmitted it to the healthcare provider. share the PHR information in cloud computing, a patient divides his PHR ...
CONCULSION AND FUTURE WORK In this project, a secure and efficient privacypreserving dynamic medical text mining and image feature extraction scheme PPDM and File Hierarchy in cloud-assisted e-healthcare ...
doi:10.31142/ijtsrd10785
fatcat:r35em5ncdregrkcpew3wn7uuqm
Encryption Based Access Control Model In Cloud: A Survey
2015
Journal of Telematics and Informatics
In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations. ...
Cloud computing is known as "Utility". Cloud computing enabling users to remotely store their data in a server and provide services on-demand. ...
Efficient User Revocation To deal with user revocation in cloud computing, we add an attribute to each user's key and employ multiple value assignments for this attribute. ...
doi:10.12928/jti.v3i1.15-21
fatcat:62as2xyhvze45gbj4x7deljt3u
Comparative Analysis of Compression Techniques and Feature Extraction for Implementing Medical Image Privacy Using Searchable Encryption
[chapter]
2015
Advances in Intelligent Systems and Computing
That's why the reason traditional access control is not enough For the High security .so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing ...
with the complex access control policy.in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption ...
security so that various Attribute based Encryption Scheme are proposed ...
doi:10.1007/978-3-319-13728-5_7
fatcat:eboezx4bfzantbrbfkab2rcsne
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Two cryptographic libraries, Hierarchical Identity-Based Encryption and Key-Policy Attribute-Based Encryption, developed in this project are useful beyond the specific cloud security problem studied. ...
Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. ...
Key-Policy Attribute-Based Crypto Library To support lazy-revocation and hierarchies, K2C uses our AB-HKU scheme that is based on Key-Policy Attribute-Based encryption scheme [21] . ...
doi:10.1007/978-3-642-31909-9_4
fatcat:2fqltq5pybcuplaibq5wmy4ukq
Cryptographic Algorithms for Efficient and Secure Data Sharing in Cloud Storage
IJARCCE - Computer and Communication Engineering
2015
IJARCCE
IJARCCE - Computer and Communication Engineering
In this paper, we explore the various encryption schemes which were proposed to solve this problem. ...
With the introduction of encryption and decryption schemes, the storing, sharing and securing of data became rampant. ...
The encryption type used here is public key system.
E. Attribute Based Encryption Schemes Attributes play a very critical role in Attribute-based Encryption (ABE) scheme. ...
doi:10.17148/ijarcce.2015.4260
fatcat:tap54egks5ezdjenaw55vctt3q
« Previous
Showing results 1 — 15 out of 2,761 results