A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems
S Wang, Y Zhang, Y Zhang - Ieee Access, 2018 - ieeexplore.ieee.org
In traditional cloud storage systems, attribute-based encryption (ABE) is regarded as an
important technology for solving the problem of data privacy and fine-grained access control …
important technology for solving the problem of data privacy and fine-grained access control …
Revocable attribute-based encryption with data integrity in clouds
Cloud computing enables enterprises and individuals to outsource and share their data.
This way, cloud computing eliminates the heavy workload of local information infrastructure …
This way, cloud computing eliminates the heavy workload of local information infrastructure …
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
公共云存储服务数据安全及隐私保护技术综述
李晖, 孙文海, 李凤华, 王博洋 - 计算机研究与发展, 2014 - cqvip.com
随着云计算技术的日益普及, 公共云存储服务已经得到普遍的应用, DropBox, Google Drive,
金山快盘等公共云存储应用的用户飞速增长. 然而, 用户对他们保存在云端数据的隐私性 …
金山快盘等公共云存储应用的用户飞速增长. 然而, 用户对他们保存在云端数据的隐私性 …
System and method for secure three-party communications
DP Felsher, RH Nagel, SM Hoffberg - US Patent 8,316,237, 2012 - Google Patents
(57) ABSTRACT A system and method for communicating information between a first party
and a second party, comprising the steps of receiving, by an intermediary, an identifier of …
and a second party, comprising the steps of receiving, by an intermediary, an identifier of …
Ciphertext-policy attribute-based encryption
In several distributed systems a user should only be able to access data if a user posses a
certain set of credentials or attributes. Currently, the only method for enforcing such policies …
certain set of credentials or attributes. Currently, the only method for enforcing such policies …
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …
Attribute-based encryption with partially hidden encryptor-specified access structures
T Nishide, K Yoneyama, K Ohta - … Conference, ACNS 2008, New York, NY …, 2008 - Springer
We propose attribute-based encryption schemes where encryptor-specified access
structures (also called ciphertext policies) are hidden. By using our schemes, an encryptor …
structures (also called ciphertext policies) are hidden. By using our schemes, an encryptor …
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-
demand, and low-cost usage of computing resources, but the data is outsourced to some …
demand, and low-cost usage of computing resources, but the data is outsourced to some …