Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

Hierarchical and shared access control

A Castiglione, A De Santis, B Masucci… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their roles and responsibilities, users are …

Cryptographic hierarchical access control for dynamic structures

A Castiglione, A De Santis, B Masucci… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …

Policy-based secure deletion

C Cachin, K Haralambiev, HC Hsiao… - Proceedings of the 2013 …, 2013 - dl.acm.org
Securely deleting data from storage systems has become difficult today. Most storage space
is provided as a virtual resource and traverses many layers between the user and the actual …

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis

J Xiong, L Chen, MZA Bhuiyan, C Cao, M Wang… - Future Generation …, 2020 - Elsevier
With the widespread adoption of mobile devices in various IoT services, an increasing
amount of personal sensitive data are stored in IoT devices using flash memory as storage …

Achieving simple, secure and efficient hierarchical access control in cloud computing

S Tang, X Li, X Huang, Y Xiang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Access control is an indispensable security component of cloud computing, and hierarchical
access control is of particular interest since in practice one is entitled to different access …

A higher-level security scheme for key access on cloud computing

B Celiktas, I Celikbilek, E Ozdemir - IEEE Access, 2021 - ieeexplore.ieee.org
In this work, we construct a key access management scheme that seamlessly transitions any
hierarchical-like access policy to the digital medium. The proposed scheme allows any …

Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes

A Castiglione, A De Santis… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …

Supporting dynamic updates in storage clouds with the Akl–Taylor scheme

A Castiglione, A De Santis, B Masucci, F Palmieri… - Information …, 2017 - Elsevier
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is
moved on centralized network-based repository services, providing elastic outsourced …

A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency

I Celikbilek, B Celiktas, E Ozdemir - IEEE Access, 2024 - ieeexplore.ieee.org
This study introduces a hierarchical key assignment scheme (HKAS) based on the closest
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …