A secure cloud storage framework with access control based on blockchain

S Wang, X Wang, Y Zhang - IEEE access, 2019 - ieeexplore.ieee.org
Now more and more data are being outsourced to cloud services. In order to ensure data
security and privacy, data are usually stored on the cloud server in the form of ciphertext …

DAC-MACS: Effective data access control for multiauthority cloud storage systems

K Yang, X Jia, K Ren, B Zhang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Data access control is an effective way to ensure data security in the cloud. However, due to
data outsourcing and untrusted cloud servers, the data access control becomes a …

Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption

T Jung, XY Li, Z Wan, M Wan - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-
demand, and low-cost usage of computing resources, but the data is outsourced to some …

TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage

W Li, K Xue, Y Xue, J Hong - IEEE Transactions on parallel and …, 2015 - ieeexplore.ieee.org
Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool
to guarantee data owners' direct control over their data in public cloud storage. The earlier …

RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage

K Xue, Y Xue, J Hong, W Li, H Yue… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Data access control is a challenging issue in public cloud storage systems. Ciphertext-policy
attribute-based encryption (CP-ABE) has been adopted as a promising technique to provide …

Modeling and analysis in marine big data: Advances and challenges

D Huang, D Zhao, L Wei, Z Wang… - … Problems in Engineering, 2015 - Wiley Online Library
It is aware that big data has gathered tremendous attentions from academic research
institutes, governments, and enterprises in all aspects of information sciences. With the …

[PDF][PDF] A survey on secure cloud: security and privacy in cloud computing

SN Kumar, A Vajpayee - American Journal of Systems and …, 2016 - researchgate.net
Cloud computing is an emerging technology that is still unclear to many security problems.
The security problem becomes amplified under the cloud model as new dimensions enter …

Online/offline MA-CP-ABE with cryptographic reverse firewalls for IoT

J Li, Y Fan, X Bian, Q Yuan - Entropy, 2023 - mdpi.com
Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to
save storage and computing cost. Therefore, the efficient realization of one-to-many …

Attributed-based access control for multi-authority systems in cloud storage

K Yang, X Jia - 2012 IEEE 32nd International Conference on …, 2012 - ieeexplore.ieee.org
Cipher text-Policy Attribute-base Encryption (CP-ABE) is regarded as one of the most
suitable technologies for data access control in cloud storage. In almost all existing CP-ABE …

A comprehensive optical and electrical properties analysis of Mg doped ZnO nanocrystalline thin-films for optoelectronic applications

MR Rahman, MN Uddin, M Hoq - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
In this research, the influence of doping variations of Mg-doped zinc oxide (ZnO) and the
impact upon the optical and electrical properties were analyzed. The sol-gel spin coating …