메뉴 건너뛰기




Volumn 14, Issue 2, 2013, Pages 85-97

Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage

Author keywords

Cloud storage; Cryptographic access control; Revocation optimization

Indexed keywords

CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTIONS; CLOUD STORAGES; CRYPTOGRAPHIC ACCESS CONTROLS; CRYPTOGRAPHIC CLOUDS; REVOCATION SCHEME; SECURITY ANALYSIS; SENSITIVE DATAS;

EID: 84878313623     PISSN: 18691951     EISSN: 1869196X     Source Type: Journal    
DOI: 10.1631/jzus.C1200240     Document Type: Article
Times cited : (46)

References (33)
  • 1
    • 84870062172 scopus 로고    scopus 로고
    • Accessed on June 11, 2012
    • Amazon, 2012. Amazon Simple Storage Service. Available from http://aws.amazon.com/s3/ [Accessed on June 11, 2012].
    • (2012) Amazon Simple Storage Service
  • 5
    • 50249162614 scopus 로고    scopus 로고
    • Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
    • doi:10.1109/SP.2008.12
    • Blanchet, B., Chaudhuri, A., 2008. Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. IEEE Symp. on Security and Privacy, p.417-431. [doi:10.1109/SP.2008.12]
    • (2008) IEEE Symp. on Security and Privacy , pp. 417-431
    • Blanchet, B.1    Chaudhuri, A.2
  • 6
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • 1729054
    • Blaze, M., Bleumer, G., Strauss, M., 1998. Divertible protocols and atomic proxy cryptography. LNCS, 1403:127-144. [doi:10.1007/BFb0054122]
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 7
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • 2237311
    • Boneh, D., Gentry, C., Waters, B., 2005. Collusion resistant broadcast encryption with short ciphertexts and private keys. LNCS, 3621:258-275. [doi:10.1007/11535218-16]
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 12
    • 84875677008 scopus 로고    scopus 로고
    • Hadoop [Accessed on June 28, 2012]
    • Hadoop, 2012. HDFS Architecture Guide. Available from http://hadoop.apache.org/docs/hdfs/current/hdfs-design.html [Accessed on June 28, 2012].
    • (2012) HDFS Architecture Guide
  • 16
    • 77955211933 scopus 로고    scopus 로고
    • Revocation Systems with Very Small Private Keys
    • doi:10.1109/SP.2010.23
    • Lewko, A., Sahai, A., Waters, B., 2010. Revocation Systems with Very Small Private Keys. IEEE Symp. on Security and Privacy, p.273-285. [doi:10.1109/SP.2010.23]
    • (2010) IEEE Symp. on Security and Privacy , pp. 273-285
    • Lewko, A.1    Sahai, A.2    Waters, B.3
  • 18
    • 79951935674 scopus 로고    scopus 로고
    • Unidirectional chosenciphertext secure proxy re-encryption
    • 2815852 10.1109/TIT.2011.2104470
    • Libert, B., Vergnaud, D., 2011. Unidirectional chosenciphertext secure proxy re-encryption. IEEE Trans. Inf. Theory, 57(3):1786-1802. [doi:10.1007/978-3-540-78440-1-21]
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.3 , pp. 1786-1802
    • Libert, B.1    Vergnaud, D.2
  • 19
    • 84878333979 scopus 로고    scopus 로고
    • Accessed on July 26, 2012
    • OpenSSL, 2012. OpenSSL: Cryptography and SSL/TLS Toolkit. Available from http://www.openssl.org/ [Accessed on July 26, 2012].
    • (2012) OpenSSL: Cryptography and SSL/TLS Toolkit
  • 21
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • 1072424 0677.68024 10.1145/62044.62050
    • Rabin, M.O., 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM, 36(2):335-348. [doi:10.1145/62044.62050]
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 23
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • Rivest, R., 1997. All-or-nothing encryption and the package transform. LNCS, 1267:210-218. [doi:10.1007/BFb0052348]
    • (1997) LNCS , vol.1267 , pp. 210-218
    • Rivest, R.1
  • 24
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • 2352204
    • Sahai, A., Waters, B., 2005. Fuzzy identity-based encryption. LNCS, 3494:557-557. [doi:10.1007/11426639-27]
    • (2005) LNCS , vol.3494 , pp. 557-557
    • Sahai, A.1    Waters, B.2
  • 26
    • 0018545449 scopus 로고
    • How to share a secret
    • 549252 0414.94021 10.1145/359168.359176
    • Shamir, A., 1979. How to share a secret. Commun. ACM, 22(11):612-613. [doi:10.1145/359168.359176]
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 28
    • 84866619747 scopus 로고    scopus 로고
    • Secure overlay cloud storage with access control and assured deletion
    • 10.1109/TDSC.2012.49
    • Tang, Y., Lee, P., Lui, J., Perlman, R., 2012. Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Depend. Sec. Comput., 9(6):903-916. [doi:10.1109/TDSC.2012.49]
    • (2012) IEEE Trans. Depend. Sec. Comput. , vol.9 , Issue.6 , pp. 903-916
    • Tang, Y.1    Lee, P.2    Lui, J.3    Perlman, R.4
  • 29
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • 2804908
    • Waters, B., 2011. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. LNCS, 6571:53-70. [doi:10.1007/978-3-642-19379-8-4]
    • (2011) LNCS , vol.6571 , pp. 53-70
    • Waters, B.1
  • 32
    • 77953310709 scopus 로고    scopus 로고
    • Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing
    • doi:10.1109/INFCOM.2010.5462174
    • Yu, S., Wang, C., Ren, K., Lou, W., 2010a. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. IEEE INFOCOM, p.1-9. [doi:10.1109/INFCOM.2010.5462174]
    • (2010) IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.