[PDF][PDF] Over-encryption: Management of access control evolution on outsourced data

SDC Di Vimercati, S Foresti, S Jajodia… - Proceedings of the 33rd …, 2007 - vldb.org
Data outsourcing is emerging today as a successful paradigm allowing users and
organizations to exploit external services for the distribution of resources. A crucial problem …

[PDF][PDF] A review on data security in cloud computing

AA Soofi, MI Khan, FE Amin - International Journal of Computer …, 2017 - academia.edu
Cloud computing is an Internet-based computing and next stage in evolution of the internet.
It has received significant attention in recent years but security issue is one of the major …

{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}

S Kumar, Y Hu, MP Andersen, RA Popa… - 28th USENIX security …, 2019 - usenix.org
As the Internet of Things (IoT) emerges over the next decade, develo** secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …

Encryption policies for regulating access to outsourced data

SDCD Vimercati, S Foresti, S Jajodia… - ACM Transactions on …, 2010 - dl.acm.org
Current access control models typically assume that resources are under the strict custody of
a trusted party which monitors each access request to verify if it is compliant with the …

Provably-secure time-bound hierarchical key assignment schemes

G Ateniese, A De Santis, AL Ferrara… - Proceedings of the 13th …, 2006 - dl.acm.org
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …

A lightweight secure data sharing scheme for mobile cloud computing

R Li, C Shen, H He, X Gu, Z Xu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the popularity of cloud computing, mobile devices can store/retrieve personal data from
anywhere at any time. Consequently, the data security problem in mobile cloud becomes …

On the practicality of cryptographically enforcing dynamic access control policies in the cloud

WC Garrison, A Shull, S Myers… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
The ability to enforce robust and dynamic access controls on cloud-hosted data while
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …

A data outsourcing architecture combining cryptography and access control

SDC Di Vimercati, S Foresti, S Jajodia… - Proceedings of the …, 2007 - dl.acm.org
Data outsourcing is becoming today a successful solution that allows users and
organizations to exploit external servers for the distribution of resources. Some of the most …

Cloud computing security: challenges and future trends

T Radwan, MA Azer… - International Journal of …, 2017 - inderscienceonline.com
Cloud computing is one of the most trendy terminologies. Cloud providers aim to satisfy
clients' requirements for computing resources such as services, applications, networks …

The issues of cloud computing security in high-speed railway

X Tan, B Ai - Proceedings of 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Cloud computing has brought new changes and opportunities to IT industry. It is the result of
the evolution of a variety of techniques. And the railway department will use the cloud …