Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








8 Hits in 6.4 sec

An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control

Yuancheng Li, Pan Zhang, Boyan Wang
2018 Applied Sciences  
In power cloud environment, the existing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) access control schemes, do not consider the generation of access structure and the existence of malicious  ...  To tackle these problems, a power cloud access control (PCAC) scheme is proposed, which improves the traditional CP-ABE access control model.  ...  In Section 6, our scheme is compared with Waters' scheme [12] and the Robust and Auditable Access Control (RAAC) [5] scheme to test the time consumption and storage consumption of PCAC.  ... 
doi:10.3390/app8101836 fatcat:oavdjxilbbbkfitbuilvanc3xm

A Survey on Access Control in Semi-Trusted Cloud Environment

E. Karthik
2019 International Journal for Research in Applied Science and Engineering Technology  
In P2P based systems, CP-ABE algorithm along with a proxy re-encryption scheme has been for access control in cloud storage.  ...  CP-ABE algorithm is widely used to provide access control for the outsourced data in the cloud through access policies.  ...  Hence to overcome this problem, a more efficient heterogeneous framework scheme named RAAC is proposed for access control along with an auditing mechanism.  ... 
doi:10.22214/ijraset.2019.3049 fatcat:u24nqtjql5dpzhufwto2sh2r5a

A Scalable and Efficient Multi-agent Architecture for Malware Protection in Data Sharing over Mobile Cloud

Zahid Hussain Qaisar, Ruixuan Li, Sultan H. Almotiri, Mohammed A. Alghamdi, Arfan Ali Nagra, Ghulam Ali
2021 IEEE Access  
Access control based on Attribute-Based Encryption (ABE) is an effective technique to ensure data shared security and privacy in the public cloud.  ...  Therefore, we introduce a scalable multiagent system architecture based on CP-ABE to ensure data sharing on public cloud storage and reliability in our proposed work.  ...  Adeel Aslam for supporting and helping us in this work.  ... 
doi:10.1109/access.2021.3067284 fatcat:kvo5abrhvvg7hjvptoygqc32jq

An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud

Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu
2020 International Journal of Distributed Sensor Networks  
With the development of cloud computing, more and more video services are moving to the cloud. How to realize fine-grained access control of those data on cloud becomes an urgent problem.  ...  To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree.  ...  Declaration of conflicting interests The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.  ... 
doi:10.1177/1550147720908196 fatcat:zbwxfypfhbe3be6rekhgxb2qsy

MULTIPLE ATTRIBUTE AUTHORITIES BASED CLOUD DATA SECURITY USING SCP-ABE AND FILE AUDITING SCHEME

Sneha George, Dharmaraj
IJRCS-International Journal of Research in Computer Science   unpublished
Data access control is a challenging issue in public cloud storage systems.  ...  Cipher text-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but-curious  ...  Thus our scheme can not only remove the single-point performance bottleneck but also be able to provide a robust, high-efficient, and secure access control for public cloud storage.  ... 
fatcat:uwwgsy2cfffivnque4ticcg65i

Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow

Stefan Becher, Armin Gerl, Bianca Meier, Felix Bölz
2020 Information  
control over the processing of their personal data.  ...  The collection and processing of personal data offers great opportunities for technological advances, but the accumulation of vast amounts of personal data also increases the risk of misuse for malicious  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info11070356 fatcat:krihxseexjahvnslayiydxhkaa

Engineering Ecosystems of Systems: UML Profile, Credential Design, and Risk-balanced Cellular Access Control [article]

David Bissessar, University, My
2021
To demonstrate, we define access control scheme, risk-balanced Cellular Access Control (rbCAC).  ...  The rbCAC algorithm defines access control within a cyber-physical environment in a manner which balances cost, risk, and net utility in a multi-authority setting. rbCAC is demonstrated it in an Air Travel  ...  Dr Adams, thank you for your guidance, thoughts and friendship throughout. I am grateful for every step of the journey. I am amazed. I would also like to thank my jury and review panel, Dr.  ... 
doi:10.20381/ruor-27245 fatcat:adpy3mk4dvae3d4sr3l6quxi64

Indigenous knowledge and governance in protected areas in Australia and Sweden

Leah Dawn Talbot
2017
accessed on 3 June 2017 42 As per website -http://www.countryneedspeople.org.au/ accessed on 3 June 2017 Government and Bama priorities differ, with multiple barriers to support of Bama priorities: "In  ...  Multiple benefits to the management organisation (WTMA) and for the Bama community have been identified as a likely outcome of strategic engagement with Bama (Wet Tropics Management Authority 2017).  ...  For example, this Word Cloud displays the top 100 words spoken by all interviewees.  ... 
doi:10.4225/28/5afa3c4db90ee fatcat:kfbkz2r2jfewvgpgtvkfvx7rxa