A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control
2018
Applied Sciences
In power cloud environment, the existing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) access control schemes, do not consider the generation of access structure and the existence of malicious ...
To tackle these problems, a power cloud access control (PCAC) scheme is proposed, which improves the traditional CP-ABE access control model. ...
In Section 6, our scheme is compared with Waters' scheme [12] and the Robust and Auditable Access Control (RAAC) [5] scheme to test the time consumption and storage consumption of PCAC. ...
doi:10.3390/app8101836
fatcat:oavdjxilbbbkfitbuilvanc3xm
A Survey on Access Control in Semi-Trusted Cloud Environment
2019
International Journal for Research in Applied Science and Engineering Technology
In P2P based systems, CP-ABE algorithm along with a proxy re-encryption scheme has been for access control in cloud storage. ...
CP-ABE algorithm is widely used to provide access control for the outsourced data in the cloud through access policies. ...
Hence to overcome this problem, a more efficient heterogeneous framework scheme named RAAC is proposed for access control along with an auditing mechanism. ...
doi:10.22214/ijraset.2019.3049
fatcat:u24nqtjql5dpzhufwto2sh2r5a
A Scalable and Efficient Multi-agent Architecture for Malware Protection in Data Sharing over Mobile Cloud
2021
IEEE Access
Access control based on Attribute-Based Encryption (ABE) is an effective technique to ensure data shared security and privacy in the public cloud. ...
Therefore, we introduce a scalable multiagent system architecture based on CP-ABE to ensure data sharing on public cloud storage and reliability in our proposed work. ...
Adeel Aslam for supporting and helping us in this work. ...
doi:10.1109/access.2021.3067284
fatcat:kvo5abrhvvg7hjvptoygqc32jq
An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
2020
International Journal of Distributed Sensor Networks
With the development of cloud computing, more and more video services are moving to the cloud. How to realize fine-grained access control of those data on cloud becomes an urgent problem. ...
To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree. ...
Declaration of conflicting interests The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. ...
doi:10.1177/1550147720908196
fatcat:zbwxfypfhbe3be6rekhgxb2qsy
MULTIPLE ATTRIBUTE AUTHORITIES BASED CLOUD DATA SECURITY USING SCP-ABE AND FILE AUDITING SCHEME
IJRCS-International Journal of Research in Computer Science
unpublished
Data access control is a challenging issue in public cloud storage systems. ...
Cipher text-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but-curious ...
Thus our scheme can not only remove the single-point performance bottleneck but also be able to provide a robust, high-efficient, and secure access control for public cloud storage. ...
fatcat:uwwgsy2cfffivnque4ticcg65i
Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow
2020
Information
control over the processing of their personal data. ...
The collection and processing of personal data offers great opportunities for technological advances, but the accumulation of vast amounts of personal data also increases the risk of misuse for malicious ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/info11070356
fatcat:krihxseexjahvnslayiydxhkaa
Engineering Ecosystems of Systems: UML Profile, Credential Design, and Risk-balanced Cellular Access Control
[article]
2021
To demonstrate, we define access control scheme, risk-balanced Cellular Access Control (rbCAC). ...
The rbCAC algorithm defines access control within a cyber-physical environment in a manner which balances cost, risk, and net utility in a multi-authority setting. rbCAC is demonstrated it in an Air Travel ...
Dr Adams, thank you for your guidance, thoughts and friendship throughout. I am grateful for every step of the journey. I am amazed. I would also like to thank my jury and review panel, Dr. ...
doi:10.20381/ruor-27245
fatcat:adpy3mk4dvae3d4sr3l6quxi64
Indigenous knowledge and governance in protected areas in Australia and Sweden
2017
accessed on 3 June 2017 42 As per website -http://www.countryneedspeople.org.au/ accessed on 3 June 2017 Government and Bama priorities differ, with multiple barriers to support of Bama priorities: "In ...
Multiple benefits to the management organisation (WTMA) and for the Bama community have been identified as a likely outcome of strategic engagement with Bama (Wet Tropics Management Authority 2017). ...
For example, this Word Cloud displays the top 100 words spoken by all interviewees. ...
doi:10.4225/28/5afa3c4db90ee
fatcat:kfbkz2r2jfewvgpgtvkfvx7rxa