523 research outputs found

    Attribute-based encryption for cloud computing access control: A survey

    Get PDF
    National Research Foundation (NRF) Singapore; AXA Research Fun

    Multi - owner Secure Data Sharing in Cloud Computing Environment

    Get PDF
    Data sharing in the cloud is a technique that allows users to conveniently access data over the cloud. The data owner outsources their data in the cloud due to cost reduction and the great conveniences provided by cloud services. Data owner is not able to control over their data, because cloud service provider is a third party provider.  The main crisis with data sharing in the cloud is the privacy and security issues. Various techniques are available to support user privacy and secure data sharing. This paper focus on various schemes to deal with secure data sharing such as Data sharing with forward security, secure data sharing for dynamic groups, Attribute based data sharing, encrypted data sharing and Shared Authority Based Privacy-Preserving Authentication Protocol for access control of outsourced data

    Multi-authority attribute-based keyword search over encrypted cloud data

    Get PDF
    National Research Foundation (NRF) Singapore; AXA Research Fun

    A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance

    Get PDF
    Internet of Things (IoT) cloud provides a practical and scalable solution to accommodate the data management in large-scale IoT systems by migrating the data storage and management tasks to cloud service providers (CSPs). However, there also exist many data security and privacy issues that must be well addressed in order to allow the wide adoption of the approach. To protect data confidentiality, attribute-based cryptosystems have been proposed to provide fine-grained access control over encrypted data in IoT cloud. Unfortunately, the existing attributed-based solutions are still insufficient in addressing some challenging security problems, especially when dealing with compromised or leaked user secret keys due to different reasons. In this paper, we present a practical attribute-based access control system for IoT cloud by introducing an efficient revocable attribute-based encryption scheme that permits the data owner to efficiently manage the credentials of data users. Our proposed system can efficiently deal with both secret key revocation for corrupted users and accidental decryption key exposure for honest users. We analyze the security of our scheme with formal proofs, and demonstrate the high performance of the proposed system via experiments

    A New Algorithm to Generate The Integrated Access Trees For A Document Collection

    Get PDF
    ABE schemes have been broadly in use to firmly store and allocate data in cloud computing. A procedure method which congregates the requirements of different data users is considered and used to encrypt distributed file systems. Cloud computing accumulates and categorizes a huge amount of data method possessions to endow with secure, efficient, flexible and on demand services. In ABE schemes, every document is encrypted independently and a data user can decrypt a document if the attribute set equivalents the access formation of the document. In this we confine our consideration to the document collection encryption-decryption process and pay no attention to the other technical challenges such as symmetric encryption algorithms and encrypted document search algorithms. The protection of CP-ABHE is hypothetically established and the efficiency of the integrated access tree construction algorithm is scrutinized in facet. The intact document outsourcing and sharing system contains abundant delve into lines
    • …
    corecore