Preserving Privacy of Data with Efficient Attribute-based Encryption Schemes

N Komninos - Adjunct Proceedings of the 29th ACM Conference on …, 2021 - dl.acm.org
Attribute-based encryption (ABE) schemes and their variations are often applied to preserve
the privacy of data. In particular, ABE schemes proposals are resilient to multiple attacks …

Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot

S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia - Computer Networks, 2018 - Elsevier
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures
efficient data sharing among dynamic group of users. Nevertheless, this encryption …

[HTML][HTML] MLS-ABAC: Efficient multi-level security attribute-based access control scheme

SF Aghili, M Sedaghat, D Singelée, M Gupta - Future Generation Computer …, 2022 - Elsevier
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet
of Things, where various devices with low computational power and different security levels …

DualAcE: fine‐grained dual access control enforcement with multi‐privacy guarantee in DaaS

X Tian, L Huang, Y Wang, C Sha… - Security and …, 2015 - Wiley Online Library
Database as a service (DaaS), a new paradigm of software as a service based on cloud
computing, is attracting more and more enterprises (data owners) to delegate their database …

Improving privacy and security in multi-authority attribute-based encryption

M Chase, SSM Chow - Proceedings of the 16th ACM conference on …, 2009 - dl.acm.org
Attribute based encryption (ABE)[13] determines decryption ability based on a user's
attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor different …

How to use attribute-based encryption to implement role-based access control in the cloud

Y Zhu, D Ma, CJ Hu, D Huang - … of the 2013 international workshop on …, 2013 - dl.acm.org
This paper addresses how to construct a RBAC-compatible attribute-based encryption (ABE)
for secure cloud storage, which provides a user-friendly and easy-to-manage security …

Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow

Y Zhou, C Peng, Y Tian, Z Li, W Tan - Mobile Networks and Applications, 2023 - Springer
Attribute-based encryption (ABE) can achieve data confidentiality as well as fine-grained
access control of encrypted data in data outsourcing systems. However, we urgently need to …

Multi-authority decentralized attribute-based authorization framework

K Sok, JN Colin, K Po - International Conference on Advanced Information …, 2022 - Springer
The advancement in collaborative work among multiple institutions results in tremendous
data sharing and, at the same time raises concerns about data security and privacy. Current …

Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption

J Shao, Y Zhu, Q Ji - 2017 IEEE/ACIS 16th International …, 2017 - ieeexplore.ieee.org
Attribute based encryption (ABE) is an efficient technique that exploits attributes and access
policies to achieve fine grained access control in cloud computing. Besides, outspread ABE …

A privacy-preserving attribute-based access control scheme

Y Xu, Q Zeng, G Wang, C Zhang, J Ren… - Security, Privacy, and …, 2018 - Springer
The emerging attribute-based access control (ABAC) mechanism is an expressive, flexible,
and manageable authorization technique that is particularly suitable for current distributed …