[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot

S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia - Computer Networks, 2018 - Elsevier
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures
efficient data sharing among dynamic group of users. Nevertheless, this encryption …

Multi-authority fine-grained access control with accountability and its application in cloud

J Li, X Chen, SSM Chow, Q Huang, DS Wong… - Journal of Network and …, 2018 - Elsevier
Attribute-based encryption (ABE) is one of critical primitives for the application of fine-
grained access control. To reduce the trust assumption on the attribute authority and in the …

Attribute-based keyword search over hierarchical data in cloud computing

Y Miao, J Ma, X Liu, X Li, Q Jiang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Searchable encryption (SE) has been a promising technology which allows users to perform
search queries over encrypted data. However, the most of existing SE schemes cannot deal …

Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list

JK Liu, TH Yuen, P Zhang, K Liang - … ACNS 2018, Leuven, Belgium, July 2 …, 2018 - Springer
In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption
(CP-ABE) scheme. We base on the direct revocation approach, by embedding the …

Privacy-preserving public auditing protocol for low-performance end devices in cloud

J Li, L Zhang, JK Liu, H Qian… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Cloud storage provides tremendous storage resources for both individual and enterprise
users. In a cloud storage system, the data owned by a user are no longer possessed locally …

RETRACTED ARTICLE: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption

N Deepa, P Pandiaraja - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
File storing and retrieving is performed in the robust as well as secure manner by using the
cloud computing technology. Various researchers have developed numerous mechanisms …

Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment

S Banerjee, S Roy, V Odelu, AK Das… - Journal of Information …, 2020 - Elsevier
With the ever-increasing rate of adoption of internet-enabled smart devices, the allure of
greater integration of technologies, such as smart home, smart city, and smart grid into …