Privacy protection and data security in cloud computing: a survey, challenges, and solutions
PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …
service. In recent years, there are many research schemes of cloud computing privacy …
Hierarchical and shared access control
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their roles and responsibilities, users are …
certain resources or tasks. Usually, according to their roles and responsibilities, users are …
Cryptographic hierarchical access control for dynamic structures
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
Policy-based secure deletion
Securely deleting data from storage systems has become difficult today. Most storage space
is provided as a virtual resource and traverses many layers between the user and the actual …
is provided as a virtual resource and traverses many layers between the user and the actual …
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
With the widespread adoption of mobile devices in various IoT services, an increasing
amount of personal sensitive data are stored in IoT devices using flash memory as storage …
amount of personal sensitive data are stored in IoT devices using flash memory as storage …
Achieving simple, secure and efficient hierarchical access control in cloud computing
Access control is an indispensable security component of cloud computing, and hierarchical
access control is of particular interest since in practice one is entitled to different access …
access control is of particular interest since in practice one is entitled to different access …
A higher-level security scheme for key access on cloud computing
In this work, we construct a key access management scheme that seamlessly transitions any
hierarchical-like access policy to the digital medium. The proposed scheme allows any …
hierarchical-like access policy to the digital medium. The proposed scheme allows any …
Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes
A Castiglione, A De Santis… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is
moved on centralized network-based repository services, providing elastic outsourced …
moved on centralized network-based repository services, providing elastic outsourced …
A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency
This study introduces a hierarchical key assignment scheme (HKAS) based on the closest
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …