4.7 Article

Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication

Runhua Xu et al.

Summary: The paper proposes an integrated, privacy-preserving user-centric attribute-based access control framework to ensure the security and privacy of users' data outsourced and stored by a cloud service provider (CSP). The framework includes a novel privacy-preserving, revocable ciphertext policy attribute-based encryption scheme, along with extended access protocols and secure deduplication approach. The proposed framework is evaluated and compared with other existing solutions in terms of security and performance issues.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud

Jianghong Wei et al.

Summary: Personal e-health records (EHR) can be accessed conveniently via the public cloud, with encryption protecting privacy and ensuring secure data sharing. The proposed RS-HABE scheme offers both forward and backward security, enhancing system security and functionality, although with some computational overhead.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices

Hui Ma et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage

Xueqiao Liu et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Theory & Methods

Securing Resources in Decentralized Cloud Storage

Enrico Bacis et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Hardware & Architecture

Multitenant Access Control for Cloud-Aware Distributed Filesystems

Giorgos Kappes et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Wenting Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs

Yujue Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things

Jeffrey Pawlick et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage

Yingjie Xue et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

LiveForen: Ensuring Live Forensic Integrity in the Cloud

Anyi Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Automation & Control Systems

An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing

Jianqiang Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Theory & Methods

vEPC sec: Securing LTE Network Functions Virtualization on Public Cloud

Muhammad Taqi Razor et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Scalable and secure access control policy update for outsourced big data

Somchart Fugkeaw et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Peng Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

Jianting Ning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage

Minxin Du et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing

Na Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Cong Zuo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection

Meng Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Review Genetics & Heredity

Cloud computing for genomic data analysis and collaboration

Ben Langmead et al.

NATURE REVIEWS GENETICS (2018)

Article Computer Science, Information Systems

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

Yinghui Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud

Zuobin Ying et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Lightweight Cloud Sharing PHR System with Access Policy Updating

Zuobin Ying et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Theory & Methods

Improving Privacy-Preserving CP-ABE with Hidden Access Policy

Leyou Zhang et al.

CLOUD COMPUTING AND SECURITY, PT III (2018)

Article Computer Science, Hardware & Architecture

Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

Hui Ma et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)

Article Computer Science, Information Systems

An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy

Kan Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Theory & Methods

Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

Tran Viet Xuan Phuong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)