A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data Security and Privacy Protection for Cloud Storage: A Survey
2020
IEEE Access
By providing data storage and management, cloud storage system becomes an indispensable part of the new era. ...
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world's digital economy are at the top of the tide. ...
With the technology from [65] , they achieve large universe construction, where the size of attributes is not limited and VOLUME 4, 2016 Directly revocable and verifiable keypolicy ABE scheme for large ...
doi:10.1109/access.2020.3009876
fatcat:6kcb3junlzhvvcq3qhztumpdqq
Leakage-resilient Attribute-based Encryption with CCA2 Security
2019
International Journal of Network Security
Leakage-resilient Attribute-Based Encryption (ABE) is one of efficient methods to solve the side-channel attacks. ...
Based on this basic scheme, a λ-leakage resilient CCA2 secure ABE is proposed in the standard model. ...
However, almost all of the existing leakage-resilient ABE schemes only achieve CPA security in this new setting. ...
dblp:journals/ijnsec/ZhangS19
fatcat:a7kqnu45tvav3eoqekfxct3faa
Towards a cryptography encyclopedia: a survey on attribute-based encryption
2023
Journal of Surveillance, Security and Safety
Access control, a key feature of digital business models, such as streaming, relies on the implementation of encryption schemes. ...
In this survey, we create a sub-encyclopedia for attribute-based encryption (ABE) schemes. ...
Availability of data and materials
Not applicable. ...
doi:10.20517/jsss.2023.30
fatcat:sreleuvsivbznkt72sypgthym4
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems
2023
Entropy
However, current CP-ABE schemes still face issues such as inflexible attribute revocation, relatively lower computational capabilities, and key management. ...
MA-RUABE not only enables fast and accurate data traceability, effectively preventing malicious user key leakage, but also includes a direct revocation feature, significantly enhancing computational efficiency ...
In contrast, indirect revocation can achieve finer-grained attribute revocation and offers greater flexibility. In 2011, Hur et al. [22] introduced an indirect revocation CP-ABE scheme. ...
doi:10.3390/e26010045
pmid:38248171
fatcat:w5jhl44nobgqvp6qvqzbegh3me
An Efficient Identity Based Encryption in Cloud Computing with Outsourced Revocation
2020
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. ...
This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and ...
To achieve this goal, we present a security enhanced construction under the recently formalized Refereed Delegation of Computation (RDoC) model [7] . ...
doi:10.32628/cseit20668
fatcat:foc35bd6ofcw7l5sl72c4b2bcq
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
[chapter]
2018
Lecture Notes in Computer Science
In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme. ...
We base on the direct revocation approach, by embedding the revocation list into ciphertext. ...
of Shenzhen (JCYJ20160307150216309, JCYJ20170302151321095) and Tencent "Rhinoceros Birds" -Scientific Research Foundation for Young Teachers of Shenzhen University. ...
doi:10.1007/978-3-319-93387-0_27
fatcat:yfk6scejojdnrhbgubdxguincm
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing
2021
Security and Communication Networks
Moreover, we design a robust revocable mechanism to achieve direct user revocation in our scheme. ...
To protect shared data against unauthorized accesses, many studies on Ciphertext-Policy Attribute-Based Encryption (CP-ABE) have been proposed to achieve data sharing granularity. ...
To solve the problem, the scheme [21] proposed a leakage-resilience CP-HABE scheme by introducing continuous leakage-resilience mechanism into the CP-ABE scheme. ...
doi:10.1155/2021/6646445
fatcat:ojfrrk3azrcfjb3blzolcm2uei
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks
2021
Journal of Information Security and Applications
In contrast to state-of-the-art ABE schemes, ours is capable of securely performing key revocations with a single short broadcast message, instead of a number of unicast messages that is linear with the ...
In this paper we propose a novel ABE scheme called SEA-BREW (Scalable and Efficient Abe with Broadcast REvocation for Wireless networks), which is suited for Internet of Things (IoT) and Industrial IoT ...
Since the revocation is direct, the revocation list is embedded in the ciphertext, therefore achieving immediate key revocation. ...
doi:10.1016/j.jisa.2020.102692
fatcat:uww3incg2regjabfyxxflgc5ma
Secure Storing and Sharing of Cloud Data under Key Exposure: A Survey
2020
International Journal for Research in Applied Science and Engineering Technology
An example of this can be cloud data storage where cloud service providers aren't within the identical trusted domains as end users, and hardware platforms aren't under the direct control of information ...
key, will still compromise single server and rewrite the cipher text keep therein. ...
In CP-ABE, revocation is not achieved efficiently. ...
doi:10.22214/ijraset.2020.6147
fatcat:mrtbesbypjazdh7icq6uwyrfjy
A Review of Functional Encryption in IoT Applications
2022
Sensors
Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms. ...
The Internet of Things (IoT) represents a growing aspect of how entities, including humans and organizations, are likely to connect with others in their public and private interactions. ...
The protocol achieves inside keyword-guessing attacks (KGAs) resilience, forward privacy and file-injection attack resilience. ...
doi:10.3390/s22197567
pmid:36236664
pmcid:PMC9573314
fatcat:slcetffyzzfffdq4gav72yvfly
AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks
2012
IOSR Journal of Computer Engineering
AACT is accessible as a suite of authentication and key agreement protocols built upon our AACT. Our analysis demonstrates that AACT is resilient to a number of security and privacy related attacks. ...
Security and privacy issues are of the major concern in pushing the success of WMNs for their broad deployment and for behind service-oriented applications. ...
Inter-region secure communication was achieved by using the concepts of public-key cryptography.This paper can serve as a platform for developing partially distributed system for practical scenarios as ...
doi:10.9790/0661-0520112
fatcat:wxrb53grjzdjrmbikh65wzm5iy
Secure-user sign-in authentication for IoT-based eHealth systems
2021
Complex & Intelligent Systems
However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. ...
AbstractSustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. ...
Step 2 R S tries to determine ⟨U id , C NT ⟩ from the revocation table to compute C New NT = C NT + 1 and R new = E S (U id ∥ H New ∥ C New NT ) using a master secret-key m sk . ...
doi:10.1007/s40747-020-00231-7
fatcat:djrnwxkt7ngmfjlshxydtroasq
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
2015
IEEE Transactions on Information Forensics and Security
AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. ...
Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. ...
ACKNOWLEDGEMENTS The authors offer their gratitude to their colleague Jingshan Yin, who implemented the 1-out-of-n protocol, and Shih-ming Huang from NCTU, who proofread their paper to correct minor errors ...
doi:10.1109/tifs.2014.2368352
fatcat:rx3x4xn6ejfllevpx5wbi5invu
Prevention of Identity Leakage and Access Management Using Anony Control-F Attribute Based Encryption
2018
International Journal for Research in Applied Science and Engineering Technology
Anony management decentralizes the central authority to limit the identity run and so achieves semi anonymity. ...
The protection analysis shows that each Anony management and Anony Control-F unit secure beneath the decisional linear Diffie-Hellman assumption, and new performance analysis exhibits the practicability ...
key in one category, that's manner on top of the naive arrange higher than, and it isn't this paper's scope to ensure the truthful news of the attributes. ...
doi:10.22214/ijraset.2018.3157
fatcat:xqz7kof4ezay5gigzaztsfrcxe
Efficient Data Retrieval and Fine Grained Access Control on Secure Hybrid Cloud
2020
International Journal of Emerging Trends in Engineering Research
Healthcare data has many private attributes to be secured from leakage due to inference either direct or indirect. Hybrid cloud is a model which is a combination of both private and public clouds. ...
This model is proposed as a way of storing healthcare data. The data is carefully distributed between these two clouds to bring about security of private attributes. ...
A two-fold advantage of reduction in communication cost and fine-grained access control is achieved by employing ABE method. ...
doi:10.30534/ijeter/2020/258102020
fatcat:3mqef23b7fc67pyzlzwrz3g22y
« Previous
Showing results 1 — 15 out of 158 results