Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …

[PDF][PDF] A survey on secure cloud: security and privacy in cloud computing

SN Kumar, A Vajpayee - American Journal of Systems and …, 2016 - researchgate.net
Cloud computing is an emerging technology that is still unclear to many security problems.
The security problem becomes amplified under the cloud model as new dimensions enter …

Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts

V Odelu, AK Das, MK Khan, KKR Choo, M Jo - IEEE Access, 2017 - ieeexplore.ieee.org
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications
for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment

V Odelu, AK Das, YS Rao, S Kumari, MK Khan… - Computer Standards & …, 2017 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) scheme can be deployed in a mobile
cloud environment to ensure that data outsourced to the cloud will be protected from …

Design of a new CP‐ABE with constant‐size secret keys for lightweight devices using elliptic curve cryptography

V Odelu, AK Das - Security and Communication Networks, 2016 - Wiley Online Library
The energy cost of public‐key cryptography is a vital component of modern secure
communications. It inhibits the widespread adoption within the ultra‐low energy regimes (for …

Efficient escrow-free CP-ABE with constant size ciphertext and secret key for big data storage in cloud

PK Premkamal, SK Pasupuleti… - International Journal of …, 2020 - igi-global.com
Ciphertext-policy attribute-based encryption (CP-ABE) schemes are an appropriate
cryptographic technique to enable privacy along with access control in the cloud, but the …

Ciphertext-policy attribute-based encryption with hidden access policy and testing

J Li, H Wang, Y Zhang, J Shen - KSII Transactions on Internet and …, 2016 - koreascience.kr
In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is
associated with a set of attributes, and the ciphertext is associated with an access policy …

Dynamic attribute-based signcryption without random oracles

K Emura, A Miyaji, MS Rahman - International Journal of …, 2012 - inderscienceonline.com
In SCN2010, Gagné, Narayan, and Safavi-Naini proposed attribute-based signcryption
(ABSC) with threshold structure. As in ciphertext-policy attribute-based encryption (CP-ABE) …

A survey of research progress and development tendency of attribute‐based encryption

L Pang, J Yang, Z Jiang - The Scientific World Journal, 2014 - Wiley Online Library
With the development of cryptography, the attribute‐based encryption (ABE) draws
widespread attention of the researchers in recent years. The ABE scheme, which belongs to …

Recipient anonymous ciphertext-policy attribute based encryption

YS Rao, R Dutta - … Systems Security: 9th International Conference, ICISS …, 2013 - Springer
Abstract Attribute Based Encryption (ABE) is a promising and increasingly versatile
paradigm. Given the many potential uses of ABE schemes, constructing efficient schemes …