A Proxy-Based and Collusion Resistant Multi-Authority Revocable CPABE Framework with Efficient User and Attribute-Level Revocation (PCMR-CPABE).

S Chawla, N Gupta - International Journal of Safety & …, 2023 - search.ebscohost.com
The presence of multiple authorities in multi-authority ciphertext policy attribute based
encryption (CPABE) schemes hinders an adversary's ability to compromise security. As each …

Attribute based access control in clouds: A survey

S Ruj - 2014 International Conference on Signal Processing …, 2014 - ieeexplore.ieee.org
Access control ensures that authorized users are able to access data and unauthorized
users are unable to access data. Most of the data stored in clouds is highly sensitive. So, it is …

Revocable, dynamic and decentralized data access control in cloud storage

C Wang, H **, R Wei, K Zhou - The Journal of Supercomputing, 2022 - Springer
Attribute-based encryption (ABE) can enable user-centered data sharing in untrusted cloud
scenario where users usually lack control on their outsourced data. However, existing ABE …

ABAC: Attribute-based access control

K Yang, X Jia, K Yang, X Jia - Security for cloud storage systems, 2014 - Springer
Cloud storage service allows data owner to outsource their data to the cloud and through
which provide the data access to the users. Because the cloud server and the data owner …

Temporal access control with user revocation for cloud data

N Balani, S Ruj - 2014 IEEE 13th International Conference on …, 2014 - ieeexplore.ieee.org
We propose a temporal access control scheme to protect and selectively access data in
clouds. In many applications like healthcare, online tests, social networks, data should be …

Immediate attribute revocation in decentralized attribute-based encryption access control

Y Imine, A Lounis, A Bouabdallah - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Access control is one of the most challenging issues in Cloud environment, it must ensure
data confidentiality through enforced and flexible access policies. The revocation is an …

Performance Analysis of the Proxy-Based and Collusion Resistant Revocable CPABE Framework

S Chawla, N Gupta - Authorea Preprints, 2023 - techrxiv.org
Ciphertext Policy Attribute Based Encryption (CPABE) emerged as a trusted solution to
enforce access control in an untrusted cloud environment. CPABE allows data owners to …

Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study

S Debnath, B Bhuyan - Multiagent and Grid Systems, 2018 - content.iospress.com
Data outsourcing into the third party cloud server has been radically increasing with the
expanding popularity of cloud computing. Recently, researchers are more attentive on …

Critical comparison of access control models for cloud computing

M Beraka, J Al-Muhtadi - 網際網路技術學刊, 2015 - airitilibrary.com
The emergence of cloud computing, as the latest computing paradigm, and its rapid growth,
has introduced new security concerns related to privacy, trust and access control. Access …

A policy language for context-aware access control in zero-trust network

S **ao - 2023 - dspace-test.interleaf.ie
Evolving computing technologies such as cloud, edge computing, and the Internet of Things
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …