메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2146-2155

Fine-grained access control and revocation for sharing data on clouds

Author keywords

Attribute based encryption; Cloud computing; Secure storage; User revocation

Indexed keywords

ACCESS CONTROL SCHEMES; ACCESS RIGHTS; ENCRYPTED DATA; ENCRYPTION SYSTEM; FINE-GRAINED REVOCATION; OUTSOURCE; SECURE STORAGE; SENSITIVE DATAS; THE STANDARD MODEL; USER REVOCATION;

EID: 84867426232     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPSW.2012.265     Document Type: Conference Paper
Times cited : (15)

References (26)
  • 2
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Berlin: Springer- Verlag
    • B. Waters. "Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions," in Advances in Cryptology - CRYPTO. 2009. Berlin: Springer-Verlag. pp. 619-636.
    • (2009) Advances in Cryptology - CRYPTO , pp. 619-636
    • Waters, B.1
  • 3
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Berlin: Springer- Verlag
    • A. Lewko and T. Okamoto. "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," in Advances in Cryptology - EUROCRYPT. 2010. Berlin: Springer-Verlag. pp. 62-91.
    • (2010) Advances in Cryptology - EUROCRYPT , pp. 62-91
    • Lewko, A.1    Okamoto, T.2
  • 4
    • 69949143544 scopus 로고    scopus 로고
    • Conjunctive broadcast and attribute-based encryption
    • Berlin: Springer- Verlag
    • N. Attrapadung and H. Imai, "Conjunctive broadcast and attribute-based encryption," in Pairing-Based Cryptography - Pairing. 2009. Berlin: Springer-Verlag. pp. 248-265.
    • (2009) Pairing-Based Cryptography - Pairing , pp. 248-265
    • Attrapadung, N.1    Imai, H.2
  • 5
    • 72449201970 scopus 로고    scopus 로고
    • Attribute-based encryption supporting direct/indirect revocation modes
    • Berlin: Springer- Verlag
    • N. Attrapadung and H. Imai. "Attribute-based encryption supporting direct/indirect revocation modes," in Cryptography and Coding. 2009. Berlin: Springer-Verlag. pp. 278-300.
    • (2009) Cryptography and Coding , pp. 278-300
    • Attrapadung, N.1    Imai, H.2
  • 6
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Proceedings of EUROCRYPT
    • A. Sahai and B. Waters. "Fuzzy identity-based encryption," in Proceedings of EUROCRYPT, volume 3494 of LNCS. 2005. pp. 457-473.
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 7
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai and B. Waters. "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of ACM CCS. 2006. pp. 89-98.
    • Proceedings of ACM CCS. 2006 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 8
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • R. Ostrovsky, A. Sahai and B. Waters. "Attribute-based encryption with non-monotonic access structures," in Proceedings of ACM CCS. 2007. pp. 195-203.
    • Proceedings of ACM CCS. 2007 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 11
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Proceedings of TCC
    • M. Chase. "Multi-authority attribute based encryption," in Proceedings of TCC, volume 4392 of LNCS. 2007. pp. 515-534.
    • (2007) LNCS , vol.4392 , pp. 515-534
    • Chase, M.1
  • 12
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multiauthority attribute-based encryption
    • M. Chase and S. Chow. "Improving privacy and security in multiauthority attribute-based encryption," in In Proceedings of ACM CCS. 2009. pp. 121-130.
    • Proceedings of ACM CCS. 2009 , pp. 121-130
    • Chase, M.1    Chow, S.2
  • 13
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren and W. Lou. "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proceedings of INFOCOM. 2010. pp. 534-542.
    • Proceedings of INFOCOM. 2010 , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 16
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • G. Wang, Q. Liu and J. Wu. "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proceedings of ACM CCS. 2010. pp. 735-737.
    • Proceedings of ACM CCS. 2010 , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 17
    • 79960839401 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    • G. Wang, Q. Liu, J. Wu and M. Guo. "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Journal of Computers and Security. 2011. 5(30): pp. 320-331.
    • (2011) Journal of Computers and Security , vol.5 , Issue.30 , pp. 320-331
    • Wang, G.1    Liu, Q.2    Wu, J.3    Guo, M.4
  • 18
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • S. Yu, C. Wang and K. Ren. "Attribute based data sharing with attribute revocation," in Proceeding of ASIACCS. 2010. pp. 261-270.
    • Proceeding of ASIACCS. 2010 , pp. 261-270
    • Yu, S.1    Wang, C.2    Ren, K.3
  • 19
    • 79959612798 scopus 로고    scopus 로고
    • Attribute based encryption schemes
    • JS. Su, D. Cao and XF.Wang. "Attribute based encryption schemes," Journal of Software. 2011. 22(6): pp. 1299-1315.
    • (2011) Journal of Software , vol.22 , Issue.6 , pp. 1299-1315
    • Su, J.S.1    Cao, D.2    Wang, X.F.3
  • 20
    • 33646773956 scopus 로고    scopus 로고
    • Identity-based hierarchical strongly key-insulated encryption and its application
    • Berlin: Springer- Verlag
    • Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai. "Identity-based hierarchical strongly key-insulated encryption and its application," in Advances in Cryptology - ASIACRYPT. 2005. Berlin: Springer-Verlag. pp. 495-514.
    • (2005) Advances in Cryptology - ASIACRYPT , pp. 495-514
    • Hanaoka, Y.1    Hanaoka, G.2    Shikata, J.3    Imai, H.4
  • 22
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Proceedings of CRYPTO
    • D. Boneh, C. Gentry and B. Waters. "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proceedings of CRYPTO, volume 3621 of LNCS. 2005. pp. 258-275.
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 23
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • JD. Hur and K. Noh. "Attribute-based access control with efficient revocation in data outsourcing systems," Parallel and Distributed Systems, IEEE Transactions. 2011. 22(7): pp. 1214-1221.
    • (2011) Parallel and Distributed Systems, IEEE Transactions , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.D.1    Noh, K.2
  • 24
    • 83755170574 scopus 로고    scopus 로고
    • Towards attribute revocation in key-policy attribute based encryption
    • The 10th International Conference on Cryptography and Network Security
    • PP. Wang, DG. Feng and LW. Zhang. "Towards attribute revocation in key-policy attribute based encryption," in The 10th International Conference on Cryptography and Network Security. volume 7092 of CANS. 2011. pp. 272-291.
    • (2011) CANS , vol.7092 , pp. 272-291
    • Wang, P.P.1    Feng, D.G.2    Zhang, L.W.3
  • 26
    • 44449129423 scopus 로고    scopus 로고
    • Predicate Encryption supporting disjunctions, polynomial equations and inner products
    • Berlin: Springer- Verlag
    • J. Katz, A. Sahai and B. Waters. "Predicate Encryption supporting disjunctions, polynomial equations and inner products," in Advances in Cryptology - EUROCRYPT. 2008. Berlin: Springer-Verlag. pp. 146-162.
    • (2008) Advances in Cryptology - EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.