메뉴 건너뛰기




Volumn 39, Issue 1, 2013, Pages 34-46

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage

Author keywords

[No Author keywords available]

Indexed keywords

ATTRIBUTE-BASED ENCRYPTIONS; CLOUD SERVICE PROVIDERS; CLOUD SERVICES; CLOUD STORAGE SYSTEMS; CLOUD STORAGES; DATA RETRIEVAL; ENCRYPTED DATA; FAST SEARCH; SECURE DATA; THIRD PARTIES; USER PRIVACY;

EID: 84874109689     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2012.11.002     Document Type: Article
Times cited : (73)

References (33)
  • 3
    • 84874108742 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft, Microsoft's azure. < http://www.microsoft.com/windowsazure/ >.
    • Microsoft's Azure
  • 4
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • C. Cachin, J. Camenisch, Springer Berlin/Heidelberg doi
    • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano Public key encryption with keyword search C. Cachin, J. Camenisch, Advances in Cryptology, EUROCRYPT 2004 vol. 3027 2004 Springer Berlin/Heidelberg 506 522 doi: http://dx.doi.org/10.1007/978-3-540-24676-3-30
    • (2004) Advances in Cryptology, EUROCRYPT 2004 , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 6
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-based access control with hidden policies and hidden credentials
    • K. Frikken, M. Atallah, and J. Li Attribute-based access control with hidden policies and hidden credentials IEEE Trans Comput 55 2006 1259 1270
    • (2006) IEEE Trans Comput , vol.55 , pp. 1259-1270
    • Frikken, K.1    Atallah, M.2    Li, J.3
  • 8
    • 58049192731 scopus 로고    scopus 로고
    • Attribute-based content distribution with hidden policy
    • doi: http://dx.doi.org/10.1109/NPSection2008.4664879 NPSection 2008
    • Yu S, Ren K, Lou W. Attribute-based content distribution with hidden policy. In: 4th Workshop on secure network protocols, 2008. NPSection 2008; 2008. p. 39-44. doi: http://dx.doi.org/10.1109/NPSection2008.4664879.
    • (2008) 4th Workshop on Secure Network Protocols, 2008 , pp. 39-44
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 9
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden encryptor-specified access structures
    • S. Bellovin, R. Gennaro, A. Keromytis, M. Yung, Springer Berlin/Heidelberg doi
    • T. Nishide, K. Yoneyama, and K. Ohta Attribute-based encryption with partially hidden encryptor-specified access structures S. Bellovin, R. Gennaro, A. Keromytis, M. Yung, Applied cryptography and network security vol. 5037 2008 Springer Berlin/Heidelberg 111 129 doi: http://dx.doi.org/10.1007/978-3-540- 68914-0-7
    • (2008) Applied Cryptography and Network Security , vol.5037 , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 10
    • 74249119947 scopus 로고    scopus 로고
    • Extended attribute based encryption for private information retrieval
    • doi: http://dx.doi.org/10.1109/MOBHOC.2009.5336932 doi: http://dx.doi.org/10.1109/MOBHOC.2009.5336932
    • Yinan S, Cao Z. Extended attribute based encryption for private information retrieval. In: IEEE 6th international conference on mobile ad hoc and sensor systems, 2009. MASS '09; 2009. p. 702-707. doi: http://dx.doi.org/10. 1109/MOBHOC.2009.5336932.
    • (2009) IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems, 2009. MASS '09 , pp. 702-707
    • Yinan, S.1    Cao, Z.2
  • 11
    • 54249101916 scopus 로고    scopus 로고
    • Public key encryption with keyword search revisited
    • O. Gervasi, B. Murgante, A. Lagana, D. Taniar, Y. Mun, M. Gavrilova, Springer Berlin/Heidelberg doi
    • J. Baek, R. Safavi-Naini, and W. Susilo Public key encryption with keyword search revisited O. Gervasi, B. Murgante, A. Lagana, D. Taniar, Y. Mun, M. Gavrilova, Computational science and its applications, ICCSA 2008, vol. 5072 2008 Springer Berlin/Heidelberg 1249 1259 doi: http://dx.doi.org/10.1007/978-3- 540-69839-5-96
    • (2008) Computational Science and Its Applications, ICCSA 2008 , vol.5072 , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 12
    • 80052684081 scopus 로고    scopus 로고
    • New efficient searchable encryption schemes from bilinear pairings
    • C. Gu, and Y. Zhu New efficient searchable encryption schemes from bilinear pairings Int J Network Secur 10 2010 25 31
    • (2010) Int J Network Secur , vol.10 , pp. 25-31
    • Gu, C.1    Zhu, Y.2
  • 13
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • C. Dwork, Springer Berlin/Heidelberg doi
    • X. Boyen, and B. Waters Anonymous hierarchical identity-based encryption (without random oracles) C. Dwork, Advances in cryptology-CRYPTO 2006 vol. 4117 2006 Springer Berlin/Heidelberg 290 307 doi: http://dx.doi.org/10.1007/11818175- 17
    • (2006) Advances in Cryptology-CRYPTO 2006 , vol.4117 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 14
    • 79959265831 scopus 로고    scopus 로고
    • Shared and searchable encrypted data for untrusted servers
    • C. Dong, G. Russello, and N. Dulay Shared and searchable encrypted data for untrusted servers J Computer Secur 19 3 2011 367 397
    • (2011) J Computer Secur , vol.19 , Issue.3 , pp. 367-397
    • Dong, C.1    Russello, G.2    Dulay, N.3
  • 15
    • 77949657618 scopus 로고    scopus 로고
    • Providing data confidentiality against malicious hosts in shared data spaces
    • doi: http://dx.doi.org/10.1016/j.scico.2009.07.011 [10th international conference on coordination models and languages, COORD 08]
    • Russello G, Dong C, Dulay N, Chaudron M, van Steen M. Providing data confidentiality against malicious hosts in shared data spaces. Sci Comput Programming 2010;75(6):426-39, [10th international conference on coordination models and languages, COORD 08] doi: http://dx.doi.org/10.1016/j.scico.2009.07. 011.
    • (2010) Sci Comput Programming , vol.75 , Issue.6 , pp. 426-439
    • Russello, G.1    Dong, C.2    Dulay, N.3    Chaudron, M.4    Van Steen, M.5
  • 16
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • doi: http://dx.doi.org/10.1007/978-3-540-70936-7-29 S. Vadhan, Springer Berlin/Heidelberg
    • D. Boneh, and B. Waters Conjunctive, subset, and range queries on encrypted data S. Vadhan, Theory of cryptography vol. 4392 2007 Springer Berlin/Heidelberg 535 554 doi: http://dx.doi.org/10.1007/978-3-540-70936-7-29
    • (2007) Theory of Cryptography , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 18
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • doi: http://dx.doi.org/10.1007/978-3-642-13190-5-4 H. Gilbert, Springer Berlin/Heidelberg
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption H. Gilbert, Advances in Cryptology, EUROCRYPT 2010 vol. 6110 2010 Springer Berlin/Heidelberg 62 91 doi: http://dx.doi.org/10.1007/978-3-642- 13190-5-4
    • (2010) Advances in Cryptology, EUROCRYPT 2010 , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 19
    • 84555209972 scopus 로고    scopus 로고
    • Ensuring anonymity for LBSs in smartphone environment
    • 10.3745/JIPS.2011.7.1.121
    • M. Alizaabi, C.Y. Yeun, and T.A. Martin Ensuring anonymity for LBSs in smartphone environment J Inf Process Syst 7 1 2011 121 136 10.3745/JIPS.2011.7. 1.121
    • (2011) J Inf Process Syst , vol.7 , Issue.1 , pp. 121-136
    • Alizaabi, M.1    Yeun, C.Y.2    Martin, T.A.3
  • 20
    • 80051973199 scopus 로고    scopus 로고
    • Selection of model in developing information security criteria for smart grid security system. Parallel and Distributed Processing with Applications Workshops (ISPAW)
    • doi: http://dx.doi.org/10.1109/ISPAW.2011.12
    • Ling APA, Masao M. Selection of model in developing information security criteria for smart grid security system. Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011 Ninth IEEE International Symposium on, p. 91-8. doi: http://dx.doi.org/10.1109/ISPAW.2011.12.
    • 2011 Ninth IEEE International Symposium on , pp. 91-98
    • Apa, L.1    Masao, M.2
  • 21
    • 84255215444 scopus 로고    scopus 로고
    • On secure communication in integrated heterogeneous wireless networks
    • 10.1504/IJITCC.2010.035224
    • B. Xie, A. Kumar, D. Zhao, R. Reddy, and B. He On secure communication in integrated heterogeneous wireless networks Int J Inf Technol Commun Convergence, IJITCC 1 1 2010 4 23 10.1504/IJITCC.2010.035224
    • (2010) Int J Inf Technol Commun Convergence, IJITCC , vol.1 , Issue.1 , pp. 4-23
    • Xie, B.1    Kumar, A.2    Zhao, D.3    Reddy, R.4    He, B.5
  • 22
    • 84866787448 scopus 로고    scopus 로고
    • Dynamic load balancing and network adaptive virtual storage service for mobile appliances
    • 10.3745/JIPS.2011.7.1.053
    • I. Ong, and H. Lim Dynamic load balancing and network adaptive virtual storage service for mobile appliances J Inf Process Syst 7 1 2011 53 62 10.3745/JIPS.2011.7.1.053
    • (2011) J Inf Process Syst , vol.7 , Issue.1 , pp. 53-62
    • Ong, I.1    Lim, H.2
  • 23
    • 60449100156 scopus 로고    scopus 로고
    • The design of a generic intrusion-tolerant architecture for web servers
    • A. Saidane, V. Nicomette, and Y. Deswarte The design of a generic intrusion-tolerant architecture for web servers IEEE Trans Dependable Secure Comput 6 1 2009 45 58
    • (2009) IEEE Trans Dependable Secure Comput , vol.6 , Issue.1 , pp. 45-58
    • Saidane, A.1    Nicomette, V.2    Deswarte, Y.3
  • 25
    • 33645998872 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • doi: http://dx.doi.org/10.1007/11426639-27 R. Cramer, Springer Berlin/Heidelberg
    • A. Sahai, and B. Waters Fuzzy identity-based encryption R. Cramer, Advances in cryptology, EUROCRYPT 2005 vol. 3494 2005 Springer Berlin/Heidelberg p. 557-57. doi: http://dx.doi.org/10.1007/11426639-27
    • (2005) Advances in Cryptology, EUROCRYPT 2005 , vol.3494 , pp. 557-657
    • Sahai, A.1    Waters, B.2
  • 28
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • doi: http://dx.doi.org/10.1007/978-3-642-19379-8-4 D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, Springer Berlin/Heidelberg
    • B. Waters Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, Public Key Cryptography, PKC 2011 vol. 6571 2011 Springer Berlin/Heidelberg 53 70 doi: http://dx.doi.org/10.1007/978-3-642-19379-8-4
    • (2011) Public Key Cryptography, PKC 2011 , vol.6571 , pp. 53-70
    • Waters, B.1
  • 30
    • 80053929836 scopus 로고    scopus 로고
    • Runtime verification in distributed computing
    • Malakuti S, Aksit M, Bockisch C. Runtime verification in distributed computing. J Convergence 2(1):1-10.
    • J Convergence , vol.2 , Issue.1 , pp. 1-10
    • Malakuti, S.1    Aksit, M.2    Bockisch, C.3
  • 31
    • 84858132835 scopus 로고    scopus 로고
    • Hierarchical key derivation scheme for group-oriented communication systems
    • 10.1504/IJITCC.2010.035227
    • S.-J. Wang, Y.-R. Tsai, C.-C. Shen, and P.-Y. Chen Hierarchical key derivation scheme for group-oriented communication systems Int J Inf Technol Commun Convergence, IJITCC 1 1 2011 66 76 10.1504/IJITCC.2010.035227
    • (2011) Int J Inf Technol Commun Convergence, IJITCC , vol.1 , Issue.1 , pp. 66-76
    • Wang, S.-J.1    Tsai, Y.-R.2    Shen, C.-C.3    Chen, P.-Y.4
  • 32
    • 38149092452 scopus 로고    scopus 로고
    • Pairing-based onion routing
    • doi: http://dx.doi.org/10.1007/978-3-540-75551-7-7 N. Borisov, P. Golle, Springer Berlin/Heidelberg
    • A. Kate, G. Zaverucha, and I. Goldberg Pairing-based onion routing N. Borisov, P. Golle, Privacy enhancing technologies vol. 4776 2007 Springer Berlin/Heidelberg 95 112 doi: http://dx.doi.org/10.1007/978-3-540-75551-7-7
    • (2007) Privacy Enhancing Technologies , vol.4776 , pp. 95-112
    • Kate, A.1    Zaverucha, G.2    Goldberg, I.3
  • 33
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • doi: http://dx.doi.org/10.1007/3-540-44647-8-13 J. Kilian, Springer Berlin/Heidelberg
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing J. Kilian, Advances in cryptology, CRYPTO 2001 vol. 2139 2001 Springer Berlin/Heidelberg 213 229 doi: http://dx.doi.org/10.1007/3-540-44647-8-13
    • (2001) Advances in Cryptology, CRYPTO 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.