Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds

C Ge, W Susilo, J Baek, Z Liu, J Xia… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J Xia, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J Xia… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

Attribute based data sharing with attribute revocation

S Yu, C Wang, K Ren, W Lou - Proceedings of the 5th ACM symposium …, 2010 - dl.acm.org
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic
primitive for fine-grained access control of shared data. In CP-ABE, each user is associated …

EASiER: Encryption-based access control in social networks with efficient revocation

S Jahid, P Mittal, N Borisov - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
A promising approach to mitigate the privacy risks in Online Social Networks (OSNs) is to
shift access control enforcement from the OSN provider to the user by means of encryption …

[PDF][PDF] 云计算访问控制技术研究综述

王于丁, 杨家海, 徐聪, 凌晓, 杨洋 - 软件学报, 2015 - jos.org.cn
随着云计算规模化和集约化的发展, 云安全问题成为云计算领域亟待突破的重要问题.
访问控制技术是安全问题的重中之重, 其任务是通过限制用户对数据信息的访问能力及范围 …

Searchable attribute-based mechanism with efficient data sharing for secure cloud storage

K Liang, W Susilo - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
To date, the growth of electronic personal data leads to a trend that data owners prefer to
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …

A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security

K Liang, L Fang, W Susilo… - 2013 5th international …, 2013 - ieeexplore.ieee.org
Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional
Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a cipher text under …