1,050 research outputs found

    Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe

    Get PDF
    This work shows all necessary calculations to extend the ``Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe\u27\u27 scheme of Liu and Wong with non-monotonic access structures. We ensure that the blackbox traceability property is preserved

    The Secured Client-Side Encrypted Data with Public Auditing in Cloud Storage

    Get PDF
    Cloud computing is rising worldview, empowering clients to remotely store their information in a server and give benefits on-request. In cloud computing cloud clients and cloud specialist organizations are practically sure to be from various put stock in areas. Information security and protection are the basic issues for remote information storage. A protected client authorized information get to control instrument must be given before cloud clients have the freedom to outsource touchy information to the cloud for capacity. Quality based encryption is an open key based encryption that empowers get to control over scrambled information utilizing access strategies and credited properties. In this paper, we are going to investigation different plans for encryption and conceivable answers for their constraints that comprise of Attribute based encryption (ABE), KP-ABE, CP-ABE, and Attribute-based Encryption Scheme with Non-Monotonic Access Structures. HABE.To secure outsourced information in cloud storage against debasements, adding adaptation to non-critical failure to cloud storage together with information trustworthiness checking and disappointment reparation winds up plainly basic. As of late, recovering codes have picked up prevalence because of their lower repair data transmission while giving adaptation to non-critical failure. Broad security investigation demonstrates that our plan is provable secure under arbitrary prophet show and test assessment shows that our plan is very proficient and can be practically coordinated into the recovering code-based cloud storage

    Remarks on the Cryptographic Primitive of Attribute-based Encryption

    Get PDF
    Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based on user attributes is a type of one-to-many encryption. Unlike the conventional one-to-one encryption which has no intention to exclude any partners of the intended receiver from obtaining the plaintext, an ABE system tries to exclude some unintended recipients from obtaining the plaintext whether they are partners of some intended recipients. We remark that this requirement for ABE is very hard to meet. An ABE system cannot truly exclude some unintended recipients from decryption because some users can exchange their decryption keys in order to maximize their own interests. The flaw discounts the importance of the cryptographic primitive.Comment: 9 pages, 4 figure

    AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption

    Full text link
    Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute- Based Encryption (ABE) have been proposed recently. However, the privacy problem of cloud computing is yet to be solved. This paper presents an anonymous privilege control scheme AnonyControl to address the user and data privacy problem in a cloud. By using multiple authorities in cloud computing system, our proposed scheme achieves anonymous cloud data access, finegrained privilege control, and more importantly, tolerance to up to (N -2) authority compromise. Our security and performance analysis show that AnonyControl is both secure and efficient for cloud computing environment.Comment: 9 pages, 6 figures, 3 tables, conference, IEEE INFOCOM 201

    ESPOONERBAC_{{ERBAC}}: Enforcing Security Policies In Outsourced Environments

    Full text link
    Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. There are solutions for preserving confidentiality of data while supporting search on the data stored in outsourced environments. However, such solutions do not support access policies to regulate access to a particular subset of the stored data. For complex user management, large enterprises employ Role-Based Access Controls (RBAC) models for making access decisions based on the role in which a user is active in. However, RBAC models cannot be deployed in outsourced environments as they rely on trusted infrastructure in order to regulate access to the data. The deployment of RBAC models may reveal private information about sensitive data they aim to protect. In this paper, we aim at filling this gap by proposing \textbf{ESPOONERBAC\mathit{ESPOON_{ERBAC}}} for enforcing RBAC policies in outsourced environments. ESPOONERBAC\mathit{ESPOON_{ERBAC}} enforces RBAC policies in an encrypted manner where a curious service provider may learn a very limited information about RBAC policies. We have implemented ESPOONERBAC\mathit{ESPOON_{ERBAC}} and provided its performance evaluation showing a limited overhead, thus confirming viability of our approach.Comment: The final version of this paper has been accepted for publication in Elsevier Computers & Security 2013. arXiv admin note: text overlap with arXiv:1306.482
    • …
    corecore