Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








10,243 Hits in 5.2 sec

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie
2016 IEEE Transactions on Information Forensics and Security  
In this paper, we revisited attributebased data sharing scheme in order to solve the key escrow issue and improve the ability of attribute expression in cloud computing.  ...  Ciphertext-policy attribute-based encryption (CP-ABE) is a promising encryption technology for secure data sharing in cloud computing, in which data owner can fully control access structure associated  ...  CONCLUSION In this paper, we revisited an attribute-based data sharing scheme in cloud computing. The improved key issuing protocol was presented to resolve the key escrow problem.  ... 
doi:10.1109/tifs.2016.2549004 fatcat:i3323k7efzdylhb4u6y4xqdtsu

A Review on Access Control Policy and Key Generation in Data Sharing

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant
2019 International Journal of Advanced Engineering Research and Science  
Attribute-Based Data Sharing Scheme Revisited: Ciphertext-policy attribute-based encryption (CPABE) is a very capable encryption technique for secure data sharing.  ...  Authors proposed an attribute-based data sharing scheme for cloud computing applications, which is denoted as ciphertext-policy weighted ABE scheme with removing escrow (CP-WABE-RE).  ... 
doi:10.22161/ijaers.6.2.6 fatcat:jghs5et6lbhxxjgd7e2c2d2cve

A SECURE WAY OF DATA SHARING BY IMPROVED TWO-PARTY KEY ISSUING SCHEME IN CLOUD COMPUTING

Bhavana C. Julme .
2017 International Journal of Research in Engineering and Technology  
In this paper we are revisiting the attribute based data sharing scheme in order to remove the key escrow problem as well as improve the efficiency and security of shared data resources on cloud storage  ...  In existing CP-ABE schemes, data owner has full authority to control the access policy of shared data on cloud.  ...  In CPABE scheme if an attribute is revoked the user cannot use it in the decryption phase.  ... 
doi:10.15623/ijret.2017.0603011 fatcat:oaldrngbzraxnjp2gkuc7j5sru

Secure Data Sharing In Cloud Computing By Implementing Amednded Attribute Based Data Sharing Scheme

M. Karthikraj
2017 International Journal Of Engineering And Computer Science  
In the proposed system, attribute-based data sharing scheme is revisited in order to solve the issue of "key escrow" and also to improve the persuasiveness of attribute, so that the resultant scheme is  ...  Cloud computing, is a booming computing paradigm, allowing users to remotely hoard their data in a server and provide services on-demand.  ...  CONCLUSION Proposed system, we reformed an attribute-based data sharing scheme in cloud computing. The key escrow problem was resolved by enhanced key issuing protocol .  ... 
doi:10.18535/ijecs/v6i5.30 fatcat:x3mjucju5jbatg35lmytfpjen4

Data Sharing in Cloud Computing Based On Attribute Based Encryption System

K. Subha, P. Kushal Reddy
2017 International Journal of MC Square Scientific Research  
The proposed system revisits the attribute-based data sharing scheme in order to not only to solve the key escrow issue but also to improve the expressiveness of attribute, so that the resulting scheme  ...  is friendly to cloud computing applications.  ...  Conclusion And Future Work In this paper, we redesigned an attribute-based data sharing scheme in cloud computing. The improved key issuing protocol was presented to resolve the key escrow problem.  ... 
doi:10.20894/ijmsr.117.009.002.007 fatcat:wlueoslglrgm7njjgbhiij6eba

Enhancing the Efficiency of Key Management Protocol in Attribute based Encryption for Cloud Data Sharing

Priya Chaturvedi
2019 International Journal for Research in Applied Science and Engineering Technology  
Keywords: cloud computing, Attribute based encryption cloud service provide, Cloud sharing. I.  ...  ABE scheme was proposed by Sahai and Waters in 2005 year. ABE is the mechanism in which users are allowed to encrypt and decrypt data based on the attributes provided by the user.  ...  In this paper they present a system for typical access control on encrypted data that we Attribute-Based Encryption.  ... 
doi:10.22214/ijraset.2019.6154 fatcat:6adyu2c2zvcsncxkk3tza2r45e

Categorical Heuristic for Attribute Based Encryption in the Cloud Server
English

R Brindha, R Rajagopal
2014 International Journal of Computer Trends and Technology  
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes.  ...  A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and Ciphertexts.  ...  In this method the applications where the data provider knows specially which user he wants to share with, in many applications the provider will want to share data according to some policy based on the  ... 
doi:10.14445/22312803/ijctt-v9p115 fatcat:ymn4kycumbdl7eh4jpcf7qdgly

2020 Index IEEE Transactions on Dependable and Secure Computing Vol. 17

2021 IEEE Transactions on Dependable and Secure Computing  
-Dec. 2020 1188-1206 1243-1256 Big Data Enabling Efficient User Revocation in Identity-Based Cloud Storage Audit- ing for Shared Big Data.  ...  -Feb. 2020 121-133 Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud.  ... 
doi:10.1109/tdsc.2020.3038615 fatcat:vzqqhgq3rrda3atviwpz65ch5e

Secure Fog-based E-learning Scheme

Arij Ben Amor, Mohamed Abid, Aref Meddeb
2020 IEEE Access  
In the cloud based educational context, the security factor in sharing the educational content is important and poses several security challenges, such as fine-grained access control and security preservation  ...  Performance evaluations demonstrate the efficiency of our solution, especially in terms of encryption computation costs. INDEX TERMS E-learning, fog, data sharing, access control, IBBE, CP-ABE.  ...  PRELIMINARIES This section revisits the preliminaries used to construct the Secure Data Sharing in Fog-based e-learning scheme. A.  ... 
doi:10.1109/access.2020.2973325 fatcat:r2u2eqqaczagdoysk227hnqgwe

A Survival Study on Integrity based Hashing Techniques for Secured Cloud Data Storage

M. Buvaneswari, Dr. N. Rajendran
2016 International Journal of Engineering Research and  
Cloud computing is made up of many elements, namely cloud users, cloud service providers and third parity auditors. Each element has particular part in delivering functional cloud-based applications.  ...  Though, all risks are not reduced by moving operations to a cloud environment. In this work, integrity based hashing techniques is used for secured cloud data storage.  ...  INTRODUCTION Cloud computing is computing technique used for sharing the computing resources than the local servers or personal devices for the applications.  ... 
doi:10.17577/ijertv5is100382 fatcat:jodihqd47ndnvazydhe2v7y2ki

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited

Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal
2018 Computer Networks  
Ciphertext-policy attribute-based encryption (CP-ABE) has been regarded as one of the promising solutions to protect data security and privacy in cloud storage services.  ...  In this paper, we revisit this problem, and present an expressive CP-ABE scheme supporting partially hidden access structures in the prime-order groups with improved efficiency.  ...  upload their data in encrypted forms to the cloud while sharing them with users possessing certain credentials or attributes.  ... 
doi:10.1016/j.comnet.2018.01.034 fatcat:lsebcbdizng3zjmdp7kv2bbhee

A Practical and Efficient Blockchain-Assisted Attribute-Based Encryption Scheme for Access Control and Data Sharing

Linjian Hong, Kai Zhang, Junqing Gong, Haifeng Qian, Helena Rifà-Pous
2022 Security and Communication Networks  
Attribute-based encryption (ABE) is a powerful encryption scheme with flexible access control over encrypted data that has been widely adopted in cloud computing scenarios to facilitate data sharing.  ...  Furthermore, data modification that happens in cloud storage and outsourced computation is also a challenge for the cloud-based data sharing schemes.  ...  In traditional data sharing scenarios, cloud computing and cloud storage are usually adopted to process data.  ... 
doi:10.1155/2022/4978802 fatcat:rok6urfxpbgn5axrfttcob5ure

Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks

Hui Cui, Xun Yi, Surya Nepal
2018 IEEE Access  
One technique which is potential to provide scalable access control to support data security and privacy in edge computing is attribute-based encryption (ABE).  ...  The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latency when migrating all pieces of data from the network edge to the data center for them to be approached  ...  Thanks to the property of enabling access control over data items that are encrypted, a primitive to preserve data security and privacy for scenarios like cloud computing called attribute-based encryption  ... 
doi:10.1109/access.2018.2844373 fatcat:fnefltmjt5fq3dgjhf43f7brlq

Attribute-Based Encryption with Expressive and Authorized Keyword Search [chapter]

Hui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li
2017 Lecture Notes in Computer Science  
In ABE-EAKS, every data user is associated with a set of attributes and is issued a private attribute-key corresponding to his/her attribute set, and each data owner encrypts the message using attribute-based  ...  encrypted data in the cloud.  ...  encrypted data in cloud-based storage systems.  ... 
doi:10.1007/978-3-319-60055-0_6 fatcat:i5nbu2w6t5fx3becj5xmfspncq

IMPROVING SECURITY USING ARBITRARY STATE ATTRIBUTE BASE ENCRYPTION

2016 International Journal of Advance Engineering and Research Development  
For secure knowledge sharing in cloud cipher text policy attribute based mostly coding is promising as a result of knowledge owner having full management over access policy of shared knowledge. however  ...  Thus we have a tendency to get back attribute-based knowledge sharing to resolve the key written agreement issue however additionally improve the quality of attribute, in order that the ensuing theme is  ...  CONCLUSION In this paper, we tend to style an improved attribute base sharing theme is cloud computing.  ... 
doi:10.21090/ijaerd.030930 fatcat:zovyig6qtvfpdld23tq54glxp4
« Previous Showing results 1 — 15 out of 10,243 results