메뉴 건너뛰기




Volumn 15, Issue 4, 2013, Pages 231-240

A survey on attribute-based encryption schemes of access control in cloud environments

Author keywords

Access control; Attribute based encryption; Cloud computing; fiNe grained access; Revocation.

Indexed keywords

ACCESS STRUCTURE; ATTRIBUTE-BASED ENCRYPTION SCHEMES; ATTRIBUTE-BASED ENCRYPTIONS; CIPHERTEXT POLICIES; CLOUD ENVIRONMENTS; COMMUNICATION OVERHEADS; FINE-GRAINED ACCESS; REVOCATION;

EID: 84881510395     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (140)

References (36)
  • 6
    • 80054061336 scopus 로고    scopus 로고
    • An access control system with time-constraint using support vector machines
    • C. C. Chang, I. C. Lin, and C. T. Liao, "An access control system with time-constraint using support vector machines," International Journal of Network Security, vol. 2, no. 2, pp. 150-159, 2006.
    • (2006) International Journal of Network Security , vol.2 , Issue.2 , pp. 150-159
    • Chang, C.C.1    Lin, I.C.2    Liao, C.T.3
  • 8
    • 70349459300 scopus 로고    scopus 로고
    • Cloud computing: Distributed internet computing for it and scientific research
    • M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and Athena Vakali, "Cloud computing: Distributed internet computing for it and scientific research," IEEE Internet Computing, vol. 13, pp. 10 -13, 2009.
    • (2009) IEEE Internet Computing , vol.13 , pp. 10-13
    • Dikaiakos, M.D.1    Katsaros, D.2    Mehra, P.3    Pallis, G.4    Vakali, A.5
  • 13
  • 16
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • of LNCS
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," Advances in Cryptology V EU-ROCRYPT, vol. 6110 of LNCS, pp. 62-91, 2010.
    • (2010) Advances in Cryptology V EU-ROCRYPT , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 17
    • 70350407157 scopus 로고    scopus 로고
    • Privacy-aware attribute-based encryption with user accountability
    • of LNCS
    • J. Li, K. Ren, B. Zhu, and Z. Wan, "Privacy-aware attribute-based encryption with user accountability," Information on Security, vol. 5735 of LNCS, pp. 347-362, 2009.
    • (2009) Information on Security , vol.5735 , pp. 347-362
    • Li, J.1    Ren, K.2    Zhu, B.3    Wan, Z.4
  • 20
    • 84875263535 scopus 로고    scopus 로고
    • An expres-sive decentralizing KP-ABE scheme with constant-size ciphertext
    • Q Li, H. Xiong, F. Zhang, and S. Zeng, "An expres-sive decentralizing KP-ABE scheme with constant-size ciphertext," International Journal of Network Security, vol. 15, no. 3, pp. 161-170, 2013.
    • (2013) International Journal of Network Security , vol.15 , Issue.3 , pp. 161-170
    • Li, Q.1    Xiong, H.2    Zhang, F.3    Zeng, S.4
  • 22
    • 84889096845 scopus 로고    scopus 로고
    • Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    • In Press
    • Q. Liu, G. Wang, and J. Wu, "Time-based proxy re-encryption scheme for secure data sharing in a cloud environment," Information Sciences. In Press, 2012.
    • (2012) Information Sciences.
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 25
    • 34547269639 scopus 로고    scopus 로고
    • Using threshold attribute-based encryption for practical biometric-based access control
    • D. Nali, C. Adams, and A. Miri, "Using threshold attribute-based encryption for practical biometric-based access control," International Journal of Net-work Security, vol. 1, no. 3, pp. 173-182, 2005.
    • (2005) International Journal of Net-work Security , vol.1 , Issue.3 , pp. 173-182
    • Nali, D.1    Adams, C.2    Miri, A.3
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 30
    • 80355141146 scopus 로고    scopus 로고
    • Verifiable attribute-based en-cryption
    • Q. Tang and D. Ji, "Verifiable attribute-based en-cryption," International Journal of Network Secu-rity, vol. 10, no. 2, pp. 114-120, 2010.
    • (2010) International Journal of Network Secu-rity , vol.10 , Issue.2 , pp. 114-120
    • Tang, Q.1    Ji, D.2
  • 31
    • 78649850078 scopus 로고    scopus 로고
    • A novel key management scheme for dynamic access control in a hierarchy
    • S. F. Tzeng, C. C. Lee, and T. C. Lin, "A novel key management scheme for dynamic access control in a hierarchy," International Journal of Network Secu-rity, vol. 12, no. 3, pp. 178-180, 2011.
    • (2011) International Journal of Network Secu-rity , vol.12 , Issue.3 , pp. 178-180
    • Tzeng, S.F.1    Lee, C.C.2    Lin, T.C.3
  • 33
    • 79960839401 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption and scalable user revoca-tion for sharing data in cloud servers
    • G.Wang, Q. Liu, J.Wu, and M. Guo, "Hierarchical attribute-based encryption and scalable user revoca-tion for sharing data in cloud servers," Computer & Security, vol. 30, pp. 320-331, 2011.
    • (2011) Computer & Security , vol.30 , pp. 320-331
    • Wang, G.1    Liu, Q.2    Wu, J.3    Guo, M.4
  • 34
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based en-cryption: An expressive, efficient, and provably se-cure realization
    • B. Waters, "Ciphertext-policy attribute-based en-cryption: An expressive, efficient, and provably se-cure realization," Public Key Cryptography V PKC, vol. 6571 of LNCS, pp. 53-70, 2011.
    • (2011) Public Key Cryptography V PKC of LNCS , vol.6571 , pp. 53-70
    • Waters, B.1
  • 35
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proceedings of IEEE INFO-COM, pp. 534-542, 2010.
    • (2010) in Proceedings of IEEE INFO-COM , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.