Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

Improving security and efficiency in attribute-based data sharing

J Hur - IEEE transactions on knowledge and data engineering, 2011 - ieeexplore.ieee.org
With the recent adoption and diffusion of the data sharing paradigm in distributed systems
such as online social networks or cloud computing, there have been increasing demands …

Decentralized access control with anonymous authentication of data stored in clouds

S Ruj, M Stojmenovic, A Nayak - IEEE transactions on parallel …, 2013 - ieeexplore.ieee.org
We propose a new decentralized access control scheme for secure data storage in clouds
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …

Privacy enforced access control model for secured data handling in cloud-based pervasive health care system

PB Prince, SPJ Lovesum - SN Computer Science, 2020 - Springer
Health care is a significant application of pervasive computing. In recent years, the pervasive
health care applications are replaced by cloud-based health care applications thus solving …

Match in my way: Fine-grained bilateral access control for secure cloud-fog computing

S Xu, J Ning, Y Li, Y Zhang, G Xu… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to
provide a variety of on-demand data services via the edge network. Many cryptographic …

[PDF][PDF] A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.

CC Lee, PS Chung, MS Hwang - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
Abstract In Attribute-based Encryption (ABE) scheme, attributes play a very important role.
Attributes have been exploited to generate a public key for encrypting data and have been …

[PDF][PDF] 属性基加密机制

苏金树, 曹丹, 王小峰, 孙一品, 胡乔林 - 软件学报, 2011 - jos.org.cn
由于属性基加密(attribute-based encryption, 简称ABE) 机制以属性为公钥,
将密文和用户私钥与属性关联, 能够灵活地表示访问控制策略, 从而极大地降低了数据共享细 …

Server-aided bilateral access control for secure data sharing with dynamic user groups

S Xu, J Ning, X Huang, J Zhou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As a versatile technique, cloud-fog computing extends the traditional cloud server to offer
various on-demand data services. Maintaining data confidentiality is one of the most crucial …