[HTML][HTML] Statistical privacy protection for secure data access control in cloud
Abstract Cloud Service Providers (CSPs) allow data owners to migrate their data to resource-
rich and powerful cloud servers and provide access to this data by individual users. Some of …
rich and powerful cloud servers and provide access to this data by individual users. Some of …
On anonymous attribute based encryption
Abstract Attribute Based Encryption (ABE) has found enormous scope in data confidentiality
and fine-grained access control of shared data stored in public cloud. Classical ABE …
and fine-grained access control of shared data stored in public cloud. Classical ABE …
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …
Comments on “control cloud data access privilege and anonymity with fully anonymous attribute-based encryption”
H Ma, R Zhang, W Yuan - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Most of the known attribute-based encryption (ABE) schemes focused on the data contents
privacy and the access control, but less attention was paid to the privilege control and the …
privacy and the access control, but less attention was paid to the privilege control and the …
Anonymous credential-based access control scheme for clouds
In the cloud, data is usually stored in ciphertext for security. Attribute-based encryption (ABE)
is a popular solution for allowing legal data users to access encrypted data, but it has high …
is a popular solution for allowing legal data users to access encrypted data, but it has high …
ABAC-PA2: Attribute-Based Access Control Model with Privacy aware Anonymous Access
GK Chaturvedi, M Shirole - Procedia Computer Science, 2024 - Elsevier
Cloud computing offers an excellent platform for sharing information and services among
departments, partners, customers, and other parties. To ensure the effectiveness of a cloud …
departments, partners, customers, and other parties. To ensure the effectiveness of a cloud …
Anonymous attribute-based encryption supporting efficient decryption test
Attribute-based encryption (ABE) has been widely studied recently to support fine-grained
access control of shared data. Anonymous ABE, which is a relevant notion to ABE, further …
access control of shared data. Anonymous ABE, which is a relevant notion to ABE, further …
Concrete attribute-based encryption scheme with verifiable outsourced decryption
As more sensitive data is shared and stored by third-party sites on the internet, there will be
a need to encrypt data stored at these sites. One drawback of encrypting data is that it can …
a need to encrypt data stored at these sites. One drawback of encrypting data is that it can …
Attribute-based encryption with verifiable outsourced decryption
Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows
users to encrypt and decrypt data based on user attributes. A promising application of ABE is …
users to encrypt and decrypt data based on user attributes. A promising application of ABE is …
Security Weaknesses of an" Anonymous Attribute Based Encryption" appeared in ASIACCS'13
Attribute-based Encryption (ABE) has found enormous application in fine-grained access
control of shared data, particularly in public cloud. In 2013, Zhang et al proposed a scheme …
control of shared data, particularly in public cloud. In 2013, Zhang et al proposed a scheme …