Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








213 Hits in 6.7 sec

Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice [article]

Marloes Venema, Greg Alpár, Jaap-Henk Hoepman
2021 IACR Cryptology ePrint Archive  
Attribute-based encryption (ABE) cryptographically implements finegrained access control on data.  ...  Furthermore, ABE is the only cryptographic approach to fine-grained access control that does not require an online trusted third party during access requests, and thus provides better availability properties  ...  The authors would like to thank Lejla Batina and Jan Schoone, as well as the anonymous reviewers for helpful comments and suggestions.  ... 
dblp:journals/iacr/VenemaAH21 fatcat:qljh5dacwbcu3g3rqpyba74yre

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
We carry an intensive study in the IEEE, Science Direct, Google Scholar, PubMed, and ACM for papers on EHR approach published between 2000 and 2018 and summarized them in terms of the architecture types  ...  cloud; 3) EHR cloud architecture, and; 4) diverse EHR cryptographic and non-cryptographic approaches.  ...  Hui Cui for their valuable comments, suggestions and reviews.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

Pablo Picazo-Sanchez, Juan Tapiador, Pedro Peris-Lopez, Guillermo Suarez-Tangil
2014 Sensors  
Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors.  ...  We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control.  ...  Acknowledgments This work was supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You).  ... 
doi:10.3390/s141222619 pmid:25460814 pmcid:PMC4299031 fatcat:yj6qjcjgpvgirdqqtqwppqp434

Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey

Zulianie Binti Jemihin, Soo Fun Tan, Gwo-Chin Chung
2022 Cryptography  
It provides a fine-grained access control system with high flexibility and efficiency by labeling the secret key and ciphertext with distinctive attributes.  ...  Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).  ...  Acknowledgments: This research was supported by the Universiti Malaysia Sabah Research Grant-SDK0165-2020.  ... 
doi:10.3390/cryptography6030040 fatcat:h3zmbvouwvchvnb54as7zsa3li

Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage

Huidong Qiao, Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, Ying Hu
2018 Symmetry  
The ciphertext-policy attribute-based encryption (CP-ABE) is considered as the critical technology to implement such access control.  ...  However, there still exists a large security obstacle to the implementation of CP-ABE in CCS.  ...  Abbreviations The following abbreviations are used in this manuscript: CCS Cryptographic cloud storage CP-ABE Ciphertext-policy attribute-based encryption KP-ABE Key-policy attribute-based encryption  ... 
doi:10.3390/sym10100482 fatcat:i7yy5cfygvekpcfhb6tl43pxfa

A Multi-User Searchable Encryption Scheme with Constant-Size Keys

Yu Chang, Yung Hsieh, Ja Wu
2018 International Journal of Computer & Software Engineering  
In this work, we also provide efficient mechanisms for the participation and revocation of a user. Therefore, it can be easily applied to storage systems of a University or a cooperate user.  ...  Int J Comput Softw Eng IJCSE, an open access journal  ...  In comparison with KP-ABE, CP-ABE is more appropriate for being applied to applications with complicated access control requirement since it enables data owner to choose the access structure for deciding  ... 
doi:10.15344/2456-4451/2018/129 fatcat:mj2rqebkorhxljqrirdqzke7tu

A Secured Cloud based Health Care Data Management System

Md. FakhrulAlamOnik, Khairul Anam, Syed Sabir Salman - Al - Musawi, Nafiul Rashid
2012 International Journal of Computer Applications  
We have proposed to have Cypher text Policy-ABE within our cloud infrastructure to guarantee data security, privacy and fine grained access control of data.  ...  In this paper, we have proposed a secured Health cloud architecture for patient"s health data collection. Our work is based on WSN integrated with Cloud computing technology.  ...  Step 2: Data Encryption In this step, CP-ABE algorithm is used to encrypt data. For encryption at first CP-ABE generates a public key and a master key.  ... 
doi:10.5120/7680-0983 fatcat:r3l6voyrlvephjzzmhw5g4re6e

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

Hui Cui, Robert H. Deng, Yingjiu Li, Guowei Wu
2017 IEEE Transactions on Big Data  
In this paper, we present an attribute-based storage system with secure deduplication in a hybrid cloud setting, where a private cloud is responsible for duplicate detection and a public cloud manages  ...  Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing  ...  On the basis of the large universe CP-ABE scheme proposed in [22] , below we present an attribute-based storage system with secure deduplication. • Setup.  ... 
doi:10.1109/tbdata.2017.2656120 fatcat:d6mov2xnfnbn3awfkxcec7c6re

Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems [chapter]

Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data.  ...  However, key abuse attacks in KP-ABE may impede its wide application especially in copyright-sensitive systems.  ...  Acknowledgment This work was supported in part by the US National Science Foundation under grants CNS-0716306, CNS-0626601, CNS-0746977, CNS-0831628, and CNS-0831963.  ... 
doi:10.1007/978-3-642-05284-2_18 fatcat:hee5g4krvrgevkdri6ftk26gdy

Cryptographically Enforced RBAC

Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi
2013 2013 IEEE 26th Computer Security Foundations Symposium  
In short, we provide a precise syntax for a computational version of RBAC, offer rigorous definitions for cryptographic policy enforcement of a large class of RBAC security policies, and demonstrate that  ...  Although we work with RBAC for concreteness, our general methodology could guide future research for uses of cryptography in other access-control models.  ...  This model has emerged as a simple and effective access-control mechanism for large organizations.  ... 
doi:10.1109/csf.2013.15 dblp:conf/csfw/FerraraFW13 fatcat:euedhscuqngbrlfluherkei3mi

Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [chapter]

Brent Waters
2011 Lecture Notes in Computer Science  
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive cryptographic assumptions in the standard model.  ...  Our solutions allow any encryptor to specify access control in terms of any access formula over the attributes in the system.  ...  Acknowledgements We thank Matt Green, Kazuki Yoneyama and anonymous reviewers for useful comments.  ... 
doi:10.1007/978-3-642-19379-8_4 fatcat:miq5gclnjjd7lkblsoup4ybkku

D2.2 - Attribute-Based Encryption, Dynamic Credentials and Ciphertext Delegation and Integration in Medical Devices

Tampere University, RISE Research Institutes Of Sweden AB, SECURA BV
2020 Zenodo  
Finally, an analysis on how these schemes can be implemented in medical devices.  ...  Overview of the existing Attribute-Based Encryption and Ciphertext Delegation schemes and analysis on how such schemes can help healthcare organisations to securely share data by also preserving users'  ...  Multiple Access Controls (Weak) -Multiple Access Controls is not trivial in ABE schemes, but might just as well be necessary for real-life usage of any ABE scheme.  ... 
doi:10.5281/zenodo.4022312 fatcat:j5appusbybfcxbfzs6vzlgjm6i

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Maryam Zarezadeh, Maede Ashouri-Talouki, Mohammad Siavashi
2020 Isecure  
In this paper, we address these problems by considering ciphertext-policy attribute-based encryption (CP-ABE), which is conceptually closer to the traditional access control methods such as RBAC.  ...  So, for a large amount of EHRs, this scheme is not efficient. Furthermore, using RBAC for access policy makes the policy changing difficult.  ...  They con-sidered two types of ABE schemes: key-policy ABE (KP-ABE) and CP-ABE to apply the fine-grained access control.  ... 
doi:10.22042/isecure.2020.174338.458 dblp:journals/isecure/ZarezadehAS20 fatcat:3e5xpps5pzbkjbr4okryuacdl4

Extended Functionality in Verifiable Searchable Encryption [chapter]

James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick
2016 Lecture Notes in Computer Science  
This is usually expected behaviour since CP-ABE is often used to cryptographically enforce access control policies and it is natural to assume that an entity is aware of their access rights.  ...  In practice, it may be desirable to use a 'large universe' CP-ABE scheme, wherein arbitrary textual strings are mapped to attributes (group elements), e.g. using a hash function H.  ... 
doi:10.1007/978-3-319-29172-7_12 fatcat:abmhirg6lzhf7duvahtf4nui6m

Ciphertext-Policy Attribute-Based Encryption

John Bethencourt, Amit Sahai, Brent Waters
2007 2007 IEEE Symposium on Security and Privacy (SP '07)  
In this paper we present a system for realizing complex access control on encrypted data that we call Ciphertext-Policy Attribute-Based Encryption.  ...  Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control.  ...  Their work explored new methods for employing proxy servers to hide policies and use non-monontonic access control for small universes of attributes.  ... 
doi:10.1109/sp.2007.11 dblp:conf/sp/BethencourtSW07 fatcat:2sxuuhtj5fgzzafnc5ggpdifda
« Previous Showing results 1 — 15 out of 213 results