Cryptographically enforced distributed data access control

L Ibraimi - 2011 - research.utwente.nl
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a
remote server, users lose control over their sensitive data. There are two approaches to …

Secure and efficient attribute-based access control for multiauthority cloud storage

J Wei, W Liu, X Hu - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Cloud storage facilitates both individuals and enterprises to cost effectively share their data
over the Internet. However, this also brings difficult challenges to the access control of …

Anonymous decentralized attribute-based access control for cloud-assisted IoT

H Nasiraee, M Ashouri-Talouki - Future Generation Computer Systems, 2020 - Elsevier
Abstract Attribute-Based Encryption (ABE) has emerged as powerful cryptographic tools to
bring fine-grained access control with widespread applications such as Cloud-assisted IoT …

Online/offline MA-CP-ABE with cryptographic reverse firewalls for IoT

J Li, Y Fan, X Bian, Q Yuan - Entropy, 2023 - mdpi.com
Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to
save storage and computing cost. Therefore, the efficient realization of one-to-many …

Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption

T Jung, XY Li, Z Wan, M Wan - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-
demand, and low-cost usage of computing resources, but the data is outsourced to some …

Achieving scalable access control over encrypted data for edge computing networks

H Cui, X Yi, S Nepal - IEEE Access, 2018 - ieeexplore.ieee.org
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it
adds latency when migrating all pieces of data from the network edge to the data center for …

Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption

Z Zhou, D Huang, Z Wang - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
Ciphertext Policy Attribute-Based Encryption (CP-ABE) enforces expressive data access
policies and each policy consists of a number of attributes. Most existing CP-ABE schemes …

Multi-user Searchable Attribute Based Encryption for Outsourced Big Data

K Astudillo, M Ebrahimi, A Kaplan - … on Computational Science …, 2022 - ieeexplore.ieee.org
Petabytes of data are generated every minute, and this creates a corresponding demand for
servers which ingest, process, store, and maintain this data. The scale of data has become …

Revocable, decentralized multi-Authority access control system

RR Al-Dahhan, Q Shi, GM Lee… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
For secure, public cloud storage, an access control scheme is critical, which ought to be
carefully designed to achieve fine-grained access control and support outsourceddata …

An Improvement on “CryptCloud: Secure and Expressive Data Access Control for Cloud Storage”

L Cheng, F Meng - IEEE Transactions on Services Computing, 2022 - ieeexplore.ieee.org
Recently, Ning et al. proposed the “CryptCloud: Secure and Expressive Data Access Control
for Cloud Storage” in IEEE Transaction on Services Computing. This work provided two …