Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …

A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

Attribute-based access control with efficient revocation in data outsourcing systems

J Hur, DK Noh - IEEE Transactions on Parallel and Distributed …, 2010 - ieeexplore.ieee.org
Some of the most challenging issues in data outsourcing scenario are the enforcement of
authorization policies and the support of policy updates. Ciphertext-policy attribute-based …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

Improving security and efficiency in attribute-based data sharing

J Hur - IEEE transactions on knowledge and data engineering, 2011 - ieeexplore.ieee.org
With the recent adoption and diffusion of the data sharing paradigm in distributed systems
such as online social networks or cloud computing, there have been increasing demands …

Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things

P Zeng, Z Zhang, R Lu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Modern day medical systems are closely integrated and interconnected with other systems,
such as those comprising Internet-of-Medical Things (IoMT) devices that facilitate remote …

Attribute-based data sharing scheme revisited in cloud computing

S Wang, K Liang, JK Liu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption
technique for secure data sharing in the context of cloud computing. Data owner is allowed …

[PDF][PDF] A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.

CC Lee, PS Chung, MS Hwang - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
Abstract In Attribute-based Encryption (ABE) scheme, attributes play a very important role.
Attributes have been exploited to generate a public key for encrypting data and have been …

[PDF][PDF] 属性基加密机制

苏金树, 曹丹, 王小峰, 孙一品, 胡乔林 - 软件学报, 2011 - jos.org.cn
由于属性基加密(attribute-based encryption, 简称ABE) 机制以属性为公钥,
将密文和用户私钥与属性关联, 能够灵活地表示访问控制策略, 从而极大地降低了数据共享细 …

Securing electronic medical records using attribute-based encryption on mobile devices

JA Akinyele, MW Pagano, MD Green… - Proceedings of the 1st …, 2011 - dl.acm.org
We provide a design and implementation of self-protecting electronic medical records
(EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare …