A distributed multi-authority attribute based encryption scheme for secure sharing of personal health records

HS Gardiyawasam Pussewalage… - Proceedings of the 22nd …, 2017 - dl.acm.org
Personal health records (PHR) are an emerging health information exchange model, which
facilitates PHR owners to efficiently manage their health data. Typically, PHRs are …

Collusion attacks on decentralized attributed-based encryption: analyses and a solution

E Meamari, H Guo, CC Shen, J Hur - arXiv preprint arXiv:2002.07811, 2020 - arxiv.org
Attribute-based Encryption (ABE) is an information centric security solution that moves
beyond traditional restrictions of point-to-point encryption by allowing for flexible, fine-grain …

[PDF][PDF] Secure sharing of personal health records using multi authority attribute based encryption in Cloud Computing

S Parvatikar, P Prakash, R Prakash… - International Journal of …, 2013 - academia.edu
Personal health record (PHR) is often seen as a patient-centric model of health information
exchange. However there has been privacy concerns when information is outsourced to be …

Attribute-based encryption for fine-grained access control over sensitive data

Q Dong - 2020 - keep.lib.asu.edu
The traditional access control system suffers from the problem of separation of data
ownership and management. It poses data security issues in application scenarios such as …

Catch me if you can: A secure bilateral access control system with anonymous credentials

J Ma, S Xu, J Ning, X Huang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Bilateral access control model, emerging as a novel paradigm in access control, has
garnered extensive deployment within the domain of fog computing. This model offers on …

Piratte: Proxy-based immediate revocation of attribute-based encryption

S Jahid, N Borisov - arXiv preprint arXiv:1208.4877, 2012 - arxiv.org
Access control to data in traditional enterprises is typically enforced through reference
monitors. However, as more and more enterprise data is outsourced, trusting third party …

Efficient decentralized attribute based access control for mobile clouds

SJ De, S Ruj - IEEE transactions on cloud computing, 2017 - ieeexplore.ieee.org
Fine grained access control is a requirement for data stored in untrusted servers like clouds.
Owing to the large volume of data, decentralized key management schemes are preferred …

EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation

L Wang, W Ding, Z Yan, S Qiu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoT) has led to the generation and
perception of large amounts of data from IoT devices. These data are outsourced to the …

Secured and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing

R Gupta, P Kanungo, N Dagdee, G Madhu, KS Sahoo… - Sensors, 2023 - mdpi.com
With continuous advancements in Internet technology and the increased use of
cryptographic techniques, the cloud has become the obvious choice for data sharing …

An attribute-based controlled collaborative access control scheme for public cloud storage

Y Xue, K Xue, N Gai, J Hong, DSL Wei… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In public cloud storage services, data are outsourced to semi-trusted cloud servers which
are outside of data owners' trusted domain. To prevent untrustworthy service providers from …