A Proxy-Based and Collusion Resistant Multi-Authority Revocable CPABE Framework with Efficient User and Attribute-Level Revocation (PCMR-CPABE).
The presence of multiple authorities in multi-authority ciphertext policy attribute based
encryption (CPABE) schemes hinders an adversary's ability to compromise security. As each …
encryption (CPABE) schemes hinders an adversary's ability to compromise security. As each …
Attribute based access control in clouds: A survey
S Ruj - 2014 International Conference on Signal Processing …, 2014 - ieeexplore.ieee.org
Access control ensures that authorized users are able to access data and unauthorized
users are unable to access data. Most of the data stored in clouds is highly sensitive. So, it is …
users are unable to access data. Most of the data stored in clouds is highly sensitive. So, it is …
Revocable, dynamic and decentralized data access control in cloud storage
C Wang, H **, R Wei, K Zhou - The Journal of Supercomputing, 2022 - Springer
Attribute-based encryption (ABE) can enable user-centered data sharing in untrusted cloud
scenario where users usually lack control on their outsourced data. However, existing ABE …
scenario where users usually lack control on their outsourced data. However, existing ABE …
ABAC: Attribute-based access control
Cloud storage service allows data owner to outsource their data to the cloud and through
which provide the data access to the users. Because the cloud server and the data owner …
which provide the data access to the users. Because the cloud server and the data owner …
Temporal access control with user revocation for cloud data
We propose a temporal access control scheme to protect and selectively access data in
clouds. In many applications like healthcare, online tests, social networks, data should be …
clouds. In many applications like healthcare, online tests, social networks, data should be …
Immediate attribute revocation in decentralized attribute-based encryption access control
Y Imine, A Lounis, A Bouabdallah - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Access control is one of the most challenging issues in Cloud environment, it must ensure
data confidentiality through enforced and flexible access policies. The revocation is an …
data confidentiality through enforced and flexible access policies. The revocation is an …
Performance Analysis of the Proxy-Based and Collusion Resistant Revocable CPABE Framework
Ciphertext Policy Attribute Based Encryption (CPABE) emerged as a trusted solution to
enforce access control in an untrusted cloud environment. CPABE allows data owners to …
enforce access control in an untrusted cloud environment. CPABE allows data owners to …
Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study
Data outsourcing into the third party cloud server has been radically increasing with the
expanding popularity of cloud computing. Recently, researchers are more attentive on …
expanding popularity of cloud computing. Recently, researchers are more attentive on …
Critical comparison of access control models for cloud computing
M Beraka, J Al-Muhtadi - 網際網路技術學刊, 2015 - airitilibrary.com
The emergence of cloud computing, as the latest computing paradigm, and its rapid growth,
has introduced new security concerns related to privacy, trust and access control. Access …
has introduced new security concerns related to privacy, trust and access control. Access …
A policy language for context-aware access control in zero-trust network
S **ao - 2023 - dspace-test.interleaf.ie
Evolving computing technologies such as cloud, edge computing, and the Internet of Things
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …