Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
An efficient file hierarchy attribute-based encryption scheme in cloud computing
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …
technology to solve the challenging problem of secure data sharing in cloud computing. The …
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
As a sophisticated mechanism for secure finegrained access control over encrypted data,
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
To date, the growth of electronic personal data leads to a trend that data owners prefer to
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …
An efficient access control scheme with outsourcing capability and attribute update for fog computing
Fog computing as an extension of cloud computing provides computation, storage and
application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a …
application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a …
Identity-based encryption transformation for flexible sharing of encrypted data in public cloud
With the rapid development of cloud computing, an increasing number of individuals and
organizations are sharing data in the public cloud. To protect the privacy of data stored in the …
organizations are sharing data in the public cloud. To protect the privacy of data stored in the …
Attribute-based data sharing scheme revisited in cloud computing
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption
technique for secure data sharing in the context of cloud computing. Data owner is allowed …
technique for secure data sharing in the context of cloud computing. Data owner is allowed …
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data
owner to delegate the access rights of the encrypted data stored on a cloud storage system …
owner to delegate the access rights of the encrypted data stored on a cloud storage system …
An efficient non-interactive multi-client searchable encryption with support for boolean queries
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …