A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems

S Wang, Y Zhang, Y Zhang - Ieee Access, 2018 - ieeexplore.ieee.org
In traditional cloud storage systems, attribute-based encryption (ABE) is regarded as an
important technology for solving the problem of data privacy and fine-grained access control …

Revocable attribute-based encryption with data integrity in clouds

C Ge, W Susilo, J Baek, Z Liu, J Xia… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cloud computing enables enterprises and individuals to outsource and share their data.
This way, cloud computing eliminates the heavy workload of local information infrastructure …

A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds

C Ge, W Susilo, J Baek, Z Liu, J Xia… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …

公共云存储服务数据安全及隐私保护技术综述

李晖, 孙文海, 李凤华, 王博洋 - 计算机研究与发展, 2014 - cqvip.com
随着云计算技术的日益普及, 公共云存储服务已经得到普遍的应用, DropBox, Google Drive,
金山快盘等公共云存储应用的用户飞速增长. 然而, 用户对他们保存在云端数据的隐私性 …

System and method for secure three-party communications

DP Felsher, RH Nagel, SM Hoffberg - US Patent 8,316,237, 2012 - Google Patents
(57) ABSTRACT A system and method for communicating information between a first party
and a second party, comprising the steps of receiving, by an intermediary, an identifier of …

Ciphertext-policy attribute-based encryption

J Bethencourt, A Sahai, B Waters - 2007 IEEE symposium on …, 2007 - ieeexplore.ieee.org
In several distributed systems a user should only be able to access data if a user posses a
certain set of credentials or attributes. Currently, the only method for enforcing such policies …

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Y Zhang, X Chen, J Li, DS Wong, H Li, I You - Information Sciences, 2017 - Elsevier
Although many users outsource their various data to clouds, data security and privacy
concerns are still the biggest obstacles that hamper the widespread adoption of cloud …

Secure attribute-based systems

M Pirretti, P Traynor, P McDaniel, B Waters - Proceedings of the 13th …, 2006 - dl.acm.org
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …

Attribute-based encryption with partially hidden encryptor-specified access structures

T Nishide, K Yoneyama, K Ohta - … Conference, ACNS 2008, New York, NY …, 2008 - Springer
We propose attribute-based encryption schemes where encryptor-specified access
structures (also called ciphertext policies) are hidden. By using our schemes, an encryptor …

Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption

T Jung, XY Li, Z Wan, M Wan - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-
demand, and low-cost usage of computing resources, but the data is outsourced to some …