메뉴 건너뛰기




Volumn , Issue , 2010, Pages 922-929

Efficient sharing of secure cloud storage services

Author keywords

Cloud computing; Hierarchical identity based encryption; Multiple recipients; Secure storage

Indexed keywords

CIPHERTEXTS; CLOUD COMPUTING; CLOUD STORAGES; HIERARCHICAL IDENTITY-BASED ENCRYPTIONS; MULTIPLE RECIPIENTS; PRIVATE KEY; PUBLIC KEYS; SECURE STORAGE; USER HIERARCHY;

EID: 78249245445     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2010.171     Document Type: Conference Paper
Times cited : (28)

References (20)
  • 1
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • volume 2139 of LNCS
    • D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Proceedings of CRYPTO 2001, volume 2139 of LNCS, pages 213-229.
    • Proceedings of CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 2
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical id-based cryptography
    • volume 2501 of LNCS
    • C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In Proceedings of ASIACRYPT 2002, volume 2501 of LNCS, pages 548- 566.
    • Proceedings of ASIACRYPT 2002 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 3
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • volume 2332 of LNCS
    • J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In Proceedings of EUROCRYPT 2002, volume 2332 of LNCS, pages 466- 481.
    • Proceedings of EUROCRYPT 2002 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 4
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • volume 3494 of LNCS
    • D. Boneh, X. Boyen, and E. Goh. Hierarchical identity based encryption with constant size ciphertext. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 440-456.
    • Proceedings of EUROCRYPT 2005 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.3
  • 5
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • volume 3027 of LNCS
    • D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Proceedings of EUROCRYPT 2004, volume 3027 of LNCS, pages 223-38.
    • Proceedings of EUROCRYPT 2004 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 6
    • 70350663051 scopus 로고    scopus 로고
    • Hierarchical identity base encryption with polynomially many levels
    • volume 5444 of LNCS
    • C. Gentry and S. Halevi. Hierarchical identity base encryption with polynomially many levels. In Proceedings of TCC 2009, volume 5444 of LNCS, pages.437-456.
    • Proceedings of TCC 2009 , pp. 437-456
    • Gentry, C.1    Halevi, S.2
  • 7
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • volume 5677 of LNCS
    • B. Waters. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In Proceedings of CRYPTO 2009, volume 5677 of LNCS, pages 619-636.
    • Proceedings of CRYPTO 2009 , pp. 619-636
    • Waters, B.1
  • 9
    • 49149119622 scopus 로고    scopus 로고
    • Computing in the clouds
    • Dec.
    • A. Weiss. Computing in the clouds. netWorker, 11(4): 16-25, Dec. 2007.
    • (2007) NetWorker , vol.11 , Issue.4 , pp. 16-25
    • Weiss, A.1
  • 11
    • 56349150824 scopus 로고    scopus 로고
    • Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities
    • R. Buyya, C. S. Yeo, and S. Venugopal. Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. In Proceedings of IEEE HPCC 2008, pages 5-13.
    • Proceedings of IEEE HPCC 2008 , pp. 5-13
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3
  • 12
    • 51949087262 scopus 로고    scopus 로고
    • Cloud computing-issues, research and implementations
    • M. A. Vouk. Cloud computing-issues, research and implementations. In Proceedings of ITI 2008, pages 31-40.
    • Proceedings of ITI 2008 , pp. 31-40
    • Vouk, M.A.1
  • 13
    • 70749116607 scopus 로고    scopus 로고
    • An efficient privacy preserving keyword search scheme in cloud computing
    • Q. Liu, G. Wang and J. Wu. An efficient privacy preserving keyword search scheme in cloud computing. In Proceedings of IEEE CSE 2009/TrustCom 2009, pages 715-720.
    • Proceedings of IEEE CSE 2009/TrustCom 2009 , pp. 715-720
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 14
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • volume 3494 of LNCS
    • A. Sahai and B. Waters. Fuzzy identity-based encryption. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 457-473.
    • Proceedings of EUROCRYPT 2005 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 15
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B.Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of ACM CCS 2006, pages 89-98.
    • Proceedings of ACM CCS 2006 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 17
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • volume 4392 of LNCS
    • M. Chase. Multi-authority attribute based encryption. In Proceedings of TCC 2007, volume 4392 of LNCS, pages 515-534.
    • Proceedings of TCC 2007 , pp. 515-534
    • Chase, M.1
  • 18
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multiauthority attribute-based encryption
    • M. Chase and S. Chow. Improving privacy and security in multiauthority attribute-based encryption. In Proceedings of ACM CCS 2009, pages 121-130.
    • Proceedings of ACM CCS 2009 , pp. 121-130
    • Chase, M.1    Chow, S.2
  • 19
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of IEEE INFOCOM 2010, pages 15-19.
    • Proceedings of IEEE INFOCOM 2010 , pp. 15-19
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 20
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • S. Yu, K. Ren, and W. Lou. FDAC: Toward fine-grained distributed data access control in wireless sensor networks. In Proceedings of IEEE INFOCOM 2009, pages 19-25.
    • Proceedings of IEEE INFOCOM 2009 , pp. 19-25
    • Yu, S.1    Ren, K.2    Lou, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.