[HTML][HTML] Statistical privacy protection for secure data access control in cloud

Y Baseri, A Hafid, MD Firoozjaei, S Cherkaoui… - Journal of Information …, 2024 - Elsevier
Abstract Cloud Service Providers (CSPs) allow data owners to migrate their data to resource-
rich and powerful cloud servers and provide access to this data by individual users. Some of …

On anonymous attribute based encryption

P Chaudhari, ML Das, A Mathuria - … 2015, Kolkata, India, December 16-20 …, 2015 - Springer
Abstract Attribute Based Encryption (ABE) has found enormous scope in data confidentiality
and fine-grained access control of shared data stored in public cloud. Classical ABE …

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Y Zhang, X Chen, J Li, DS Wong, H Li, I You - Information Sciences, 2017 - Elsevier
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …

Comments on “control cloud data access privilege and anonymity with fully anonymous attribute-based encryption”

H Ma, R Zhang, W Yuan - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Most of the known attribute-based encryption (ABE) schemes focused on the data contents
privacy and the access control, but less attention was paid to the privilege control and the …

Anonymous credential-based access control scheme for clouds

X Yao, H Liu, H Ning, LT Yang… - IEEE Cloud …, 2015 - ieeexplore.ieee.org
In the cloud, data is usually stored in ciphertext for security. Attribute-based encryption (ABE)
is a popular solution for allowing legal data users to access encrypted data, but it has high …

ABAC-PA2: Attribute-Based Access Control Model with Privacy aware Anonymous Access

GK Chaturvedi, M Shirole - Procedia Computer Science, 2024 - Elsevier
Cloud computing offers an excellent platform for sharing information and services among
departments, partners, customers, and other parties. To ensure the effectiveness of a cloud …

Anonymous attribute-based encryption supporting efficient decryption test

Y Zhang, X Chen, J Li, DS Wong, H Li - Proceedings of the 8th ACM …, 2013 - dl.acm.org
Attribute-based encryption (ABE) has been widely studied recently to support fine-grained
access control of shared data. Anonymous ABE, which is a relevant notion to ABE, further …

Concrete attribute-based encryption scheme with verifiable outsourced decryption

C Kumar, D Kumar, AK Reddy - arXiv preprint arXiv:1407.3660, 2014 - arxiv.org
As more sensitive data is shared and stored by third-party sites on the internet, there will be
a need to encrypt data stored at these sites. One drawback of encrypting data is that it can …

Attribute-based encryption with verifiable outsourced decryption

J Lai, RH Deng, C Guan, J Weng - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows
users to encrypt and decrypt data based on user attributes. A promising application of ABE is …

Security Weaknesses of an" Anonymous Attribute Based Encryption" appeared in ASIACCS'13

P Chaudhari, ML Das, A Mathuria - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Attribute-based Encryption (ABE) has found enormous application in fine-grained access
control of shared data, particularly in public cloud. In 2013, Zhang et al proposed a scheme …