4.5 Article

Blockchain-based cloud storage system with CP-ABE-based access control and revocation process

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage

Jianting Ning et al.

Summary: Secure cloud storage is a new cloud service designed to protect the confidentiality of outsourced data and provide flexible data access to cloud users. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is considered a promising technique for securing the service, but it may lead to security breaches due to the misuse of access credentials. This paper investigates cases of access credential misuse and proposes a novel cloud storage system CryptCloud(+) to mitigate such issues. Additionally, security analysis and experiments are presented to demonstrate the system's utility.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Review Computer Science, Interdisciplinary Applications

The Revolution of Blockchain: State-of-the-Art and Research Challenges

Suyel Namasudra et al.

Summary: With the rapid development of the IT industry, data security has become a critical issue, and Blockchain technology is widely used to enhance data security. This technology allows for decentralized, immutable, and transparent transactions without the need for a trusted third party. The study discusses the fundamentals of Blockchain, its working procedure, applications in various fields, as well as future research challenges.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2021)

Article Computer Science, Information Systems

A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System

Akanksha Saini et al.

Summary: This article proposes an access control framework based on smart contracts to ensure the security of sharing EMRs among different entities in the smart healthcare system.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Automation & Control Systems

Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications

Yong Yu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Review Computer Science, Theory & Methods

Blockchain Technology for Cloud Storage: A Systematic Literature Review

Pratima Sharma et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Information Systems

Attribute-based encryption with outsourced decryption in blockchain

Hui Zheng et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2020)

Article Engineering, Industrial

Mobility-aware load Balancing for Reliable Self-Organization Networks: Multi-agent Deep Reinforcement Learning

Amin Mohajer et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2020)

Article Computer Science, Information Systems

Blockchain Meets Cloud Computing: A Survey

Keke Gai et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Revocable Attribute-Based Signature for Blockchain-Based Healthcare System

Qianqian Su et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN

Zhijun Wu et al.

FUTURE INTERNET (2020)

Article Engineering, Electrical & Electronic

Query optimization mechanisms in the cloud environments: A systematic study

Elham Azhir et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Software Engineering

An improved attribute-based encryption technique towards the data security in cloud computing

Suyel Namasudra

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)

Article Computer Science, Information Systems

A Secure Cloud Storage Framework With Access Control Based on Blockchain

Shangping Wang et al.

IEEE ACCESS (2019)

Article Automation & Control Systems

Big Data based Self-Optimization Networking: A Novel Approach Beyond Cognition

Amin Mohajer et al.

INTELLIGENT AUTOMATION AND SOFT COMPUTING (2018)

Article Computer Science, Theory & Methods

Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage

Minxin Du et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Secure data uploading scheme for a smart home system

Jian Shen et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Hardware & Architecture

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

Jian Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain

Qun Lin et al.

IEEE ACCESS (2018)

Review Computer Science, Information Systems

When Intrusion Detection Meets Blockchain Technology: A Review

Weizhi Meng et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

Yinghui Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Towards Secure Localized Certificate Revocation in Mobile Ad-Hoc Networks

Mohammad Masdari

IETE TECHNICAL REVIEW (2017)

Article Telecommunications

Comprehensive Evaluation of the Localized Certificate Revocation in Mobile Ad Hoc Network

Mohammad Masdari et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Intelligent cryptography approach for secure distributed big data storage in cloud computing

Yibin Li et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Yinghui Zhang et al.

INFORMATION SCIENCES (2017)

Review Computer Science, Hardware & Architecture

Key management in wireless Body Area Network: Challenges and issues

Mohammad Masdari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Review Computer Science, Hardware & Architecture

Cloud security issues and challenges: A survey

Ashish Singh et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

Proxy-assisted access control scheme of cloud data for smart cities

Kai Fan et al.

PERSONAL AND UBIQUITOUS COMPUTING (2017)

Article Computer Science, Information Systems

Data Backlog Analysis in Energy Harvesting Communication Systems

Riheng Jia et al.

IEEE ACCESS (2017)

Review Computer Science, Information Systems

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

Nesrine Kaaniche et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Theory & Methods

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems

Youngjoo Shin et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Hardware & Architecture

Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseaEuro

Zhen Liu et al.

COMPUTER JOURNAL (2016)

Proceedings Paper Computer Science, Information Systems

General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps

Pratish Datta et al.

INFORMATION SECURITY, ISC 2015 (2015)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)