Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Survey on revocation in ciphertext-policy attribute-based encryption

RR Al-Dahhan, Q Shi, GM Lee, K Kifayat - Sensors, 2019 - mdpi.com
Recently, using advanced cryptographic techniques to process, store, and share data
securely in an untrusted cloud environment has drawn widespread attention from academic …

Decentralizing attribute-based encryption

A Lewko, B Waters - Annual international conference on the theory and …, 2011 - Springer
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …

Improving privacy and security in multi-authority attribute-based encryption

M Chase, SSM Chow - Proceedings of the 16th ACM conference on …, 2009 - dl.acm.org
Attribute based encryption (ABE)[13] determines decryption ability based on a user's
attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor different …

User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage

J Li, W Yao, J Han, Y Zhang, J Shen - IEEE Systems Journal, 2017 - ieeexplore.ieee.org
Attribute-based encryption (ABE) can guarantee confidentiality and achieve fine-grained
data access control in a cloud storage system. Due to the fact that every attribute in ABE may …

DAC-MACS: Effective data access control for multiauthority cloud storage systems

K Yang, X Jia, K Ren, B Zhang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Data access control is an effective way to ensure data security in the cloud. However, due to
data outsourcing and untrusted cloud servers, the data access control becomes a …

A secure cloud storage framework with access control based on blockchain

S Wang, X Wang, Y Zhang - IEEE access, 2019 - ieeexplore.ieee.org
Now more and more data are being outsourced to cloud services. In order to ensure data
security and privacy, data are usually stored on the cloud server in the form of ciphertext …

Registered attribute-based encryption

S Hohenberger, G Lu, B Waters, DJ Wu - Annual International Conference …, 2023 - Springer
Attribute-based encryption (ABE) generalizes public-key encryption and enables fine-
grained control to encrypted data. However, ABE upends the traditional trust model of public …

Decentralized access control with anonymous authentication of data stored in clouds

S Ruj, M Stojmenovic, A Nayak - IEEE transactions on parallel …, 2013 - ieeexplore.ieee.org
We propose a new decentralized access control scheme for secure data storage in clouds
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …

Persona: an online social network with user-defined privacy

R Baden, A Bender, N Spring, B Bhattacharjee… - Proceedings of the …, 2009 - dl.acm.org
Online social networks (OSNs) are immensely popular, with some claiming over 200 million
users. Users share private content, such as personal information or photographs, using OSN …