A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
2016
IEEE Transactions on Information Forensics and Security
In this paper, we revisited attributebased data sharing scheme in order to solve the key escrow issue and improve the ability of attribute expression in cloud computing. ...
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising encryption technology for secure data sharing in cloud computing, in which data owner can fully control access structure associated ...
CONCLUSION In this paper, we revisited an attribute-based data sharing scheme in cloud computing. The improved key issuing protocol was presented to resolve the key escrow problem. ...
doi:10.1109/tifs.2016.2549004
fatcat:i3323k7efzdylhb4u6y4xqdtsu
A Review on Access Control Policy and Key Generation in Data Sharing
2019
International Journal of Advanced Engineering Research and Science
Attribute-Based Data Sharing Scheme Revisited: Ciphertext-policy attribute-based encryption (CPABE) is a very capable encryption technique for secure data sharing. ...
Authors proposed an attribute-based data sharing scheme for cloud computing applications, which is denoted as ciphertext-policy weighted ABE scheme with removing escrow (CP-WABE-RE). ...
doi:10.22161/ijaers.6.2.6
fatcat:jghs5et6lbhxxjgd7e2c2d2cve
A SECURE WAY OF DATA SHARING BY IMPROVED TWO-PARTY KEY ISSUING SCHEME IN CLOUD COMPUTING
2017
International Journal of Research in Engineering and Technology
In this paper we are revisiting the attribute based data sharing scheme in order to remove the key escrow problem as well as improve the efficiency and security of shared data resources on cloud storage ...
In existing CP-ABE schemes, data owner has full authority to control the access policy of shared data on cloud. ...
In CPABE scheme if an attribute is revoked the user cannot use it in the decryption phase. ...
doi:10.15623/ijret.2017.0603011
fatcat:oaldrngbzraxnjp2gkuc7j5sru
Secure Data Sharing In Cloud Computing By Implementing Amednded Attribute Based Data Sharing Scheme
2017
International Journal Of Engineering And Computer Science
In the proposed system, attribute-based data sharing scheme is revisited in order to solve the issue of "key escrow" and also to improve the persuasiveness of attribute, so that the resultant scheme is ...
Cloud computing, is a booming computing paradigm, allowing users to remotely hoard their data in a server and provide services on-demand. ...
CONCLUSION Proposed system, we reformed an attribute-based data sharing scheme in cloud computing. The key escrow problem was resolved by enhanced key issuing protocol . ...
doi:10.18535/ijecs/v6i5.30
fatcat:x3mjucju5jbatg35lmytfpjen4
Data Sharing in Cloud Computing Based On Attribute Based Encryption System
2017
International Journal of MC Square Scientific Research
The proposed system revisits the attribute-based data sharing scheme in order to not only to solve the key escrow issue but also to improve the expressiveness of attribute, so that the resulting scheme ...
is friendly to cloud computing applications. ...
Conclusion And Future Work In this paper, we redesigned an attribute-based data sharing scheme in cloud computing. The improved key issuing protocol was presented to resolve the key escrow problem. ...
doi:10.20894/ijmsr.117.009.002.007
fatcat:wlueoslglrgm7njjgbhiij6eba
Enhancing the Efficiency of Key Management Protocol in Attribute based Encryption for Cloud Data Sharing
2019
International Journal for Research in Applied Science and Engineering Technology
Keywords: cloud computing, Attribute based encryption cloud service provide, Cloud sharing. I. ...
ABE scheme was proposed by Sahai and Waters in 2005 year. ABE is the mechanism in which users are allowed to encrypt and decrypt data based on the attributes provided by the user. ...
In this paper they present a system for typical access control on encrypted data that we Attribute-Based Encryption. ...
doi:10.22214/ijraset.2019.6154
fatcat:6adyu2c2zvcsncxkk3tza2r45e
Categorical Heuristic for Attribute Based Encryption in the Cloud Server
English
2014
International Journal of Computer Trends and Technology
English
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. ...
A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and Ciphertexts. ...
In this method the applications where the data provider knows specially which user he wants to share with, in many applications the provider will want to share data according to some policy based on the ...
doi:10.14445/22312803/ijctt-v9p115
fatcat:ymn4kycumbdl7eh4jpcf7qdgly
2020 Index IEEE Transactions on Dependable and Secure Computing Vol. 17
2021
IEEE Transactions on Dependable and Secure Computing
-Dec. 2020 1188-1206 1243-1256
Big Data
Enabling Efficient User Revocation in Identity-Based Cloud Storage Audit-
ing for Shared Big Data. ...
-Feb. 2020 121-133 Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud. ...
doi:10.1109/tdsc.2020.3038615
fatcat:vzqqhgq3rrda3atviwpz65ch5e
Secure Fog-based E-learning Scheme
2020
IEEE Access
In the cloud based educational context, the security factor in sharing the educational content is important and poses several security challenges, such as fine-grained access control and security preservation ...
Performance evaluations demonstrate the efficiency of our solution, especially in terms of encryption computation costs. INDEX TERMS E-learning, fog, data sharing, access control, IBBE, CP-ABE. ...
PRELIMINARIES This section revisits the preliminaries used to construct the Secure Data Sharing in Fog-based e-learning scheme.
A. ...
doi:10.1109/access.2020.2973325
fatcat:r2u2eqqaczagdoysk227hnqgwe
A Survival Study on Integrity based Hashing Techniques for Secured Cloud Data Storage
2016
International Journal of Engineering Research and
Cloud computing is made up of many elements, namely cloud users, cloud service providers and third parity auditors. Each element has particular part in delivering functional cloud-based applications. ...
Though, all risks are not reduced by moving operations to a cloud environment. In this work, integrity based hashing techniques is used for secured cloud data storage. ...
INTRODUCTION Cloud computing is computing technique used for sharing the computing resources than the local servers or personal devices for the applications. ...
doi:10.17577/ijertv5is100382
fatcat:jodihqd47ndnvazydhe2v7y2ki
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited
2018
Computer Networks
Ciphertext-policy attribute-based encryption (CP-ABE) has been regarded as one of the promising solutions to protect data security and privacy in cloud storage services. ...
In this paper, we revisit this problem, and present an expressive CP-ABE scheme supporting partially hidden access structures in the prime-order groups with improved efficiency. ...
upload their data in encrypted forms to the cloud while sharing them with users possessing certain credentials or attributes. ...
doi:10.1016/j.comnet.2018.01.034
fatcat:lsebcbdizng3zjmdp7kv2bbhee
A Practical and Efficient Blockchain-Assisted Attribute-Based Encryption Scheme for Access Control and Data Sharing
2022
Security and Communication Networks
Attribute-based encryption (ABE) is a powerful encryption scheme with flexible access control over encrypted data that has been widely adopted in cloud computing scenarios to facilitate data sharing. ...
Furthermore, data modification that happens in cloud storage and outsourced computation is also a challenge for the cloud-based data sharing schemes. ...
In traditional data sharing scenarios, cloud computing and cloud storage are usually adopted to process data. ...
doi:10.1155/2022/4978802
fatcat:rok6urfxpbgn5axrfttcob5ure
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks
2018
IEEE Access
One technique which is potential to provide scalable access control to support data security and privacy in edge computing is attribute-based encryption (ABE). ...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latency when migrating all pieces of data from the network edge to the data center for them to be approached ...
Thanks to the property of enabling access control over data items that are encrypted, a primitive to preserve data security and privacy for scenarios like cloud computing called attribute-based encryption ...
doi:10.1109/access.2018.2844373
fatcat:fnefltmjt5fq3dgjhf43f7brlq
Attribute-Based Encryption with Expressive and Authorized Keyword Search
[chapter]
2017
Lecture Notes in Computer Science
In ABE-EAKS, every data user is associated with a set of attributes and is issued a private attribute-key corresponding to his/her attribute set, and each data owner encrypts the message using attribute-based ...
encrypted data in the cloud. ...
encrypted data in cloud-based storage systems. ...
doi:10.1007/978-3-319-60055-0_6
fatcat:i5nbu2w6t5fx3becj5xmfspncq
IMPROVING SECURITY USING ARBITRARY STATE ATTRIBUTE BASE ENCRYPTION
2016
International Journal of Advance Engineering and Research Development
For secure knowledge sharing in cloud cipher text policy attribute based mostly coding is promising as a result of knowledge owner having full management over access policy of shared knowledge. however ...
Thus we have a tendency to get back attribute-based knowledge sharing to resolve the key written agreement issue however additionally improve the quality of attribute, in order that the ensuing theme is ...
CONCLUSION In this paper, we tend to style an improved attribute base sharing theme is cloud computing. ...
doi:10.21090/ijaerd.030930
fatcat:zovyig6qtvfpdld23tq54glxp4
« Previous
Showing results 1 — 15 out of 10,243 results