메뉴 건너뛰기




Volumn 8, Issue 11, 2013, Pages 1790-1801

DAC-MACS: Effective data access control for multiauthority cloud storage systems

Author keywords

Access control; attribute revocation; CP ABE; decryption outsourcing; multiauthority cloud

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; OUTSOURCING;

EID: 84886903289     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2279531     Document Type: Article
Times cited : (252)

References (28)
  • 3
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • Springer
    • V.Goyal,A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proc. ICALP'08, 2008, pp. 579-591, Springer.
    • (2008) Proc. ICALP'08 , pp. 579-591
    • Jain, V.A.1    Pandey, O.2    Sahai, A.3
  • 4
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • ACM
    • R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. CCS'07, 2007, pp. 195-203, ACM.
    • (2007) Proc. CCS'07 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 5
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Springer
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Proc. PKC'11, 2011, pp. 53-70, Springer.
    • Proc. PKC'11 , vol.2011 , pp. 53-70
    • Waters, B.1
  • 6
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Springer
    • A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. EUROCRYPT'10, 2010, pp. 62-91, Springer.
    • Proc. EUROCRYPT'10 , vol.2010 , pp. 62-91
    • Lewko, A.B.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 7
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Springer
    • M. Chase, "Multi-authority attribute based encryption," in Proc. TCC'07, 2007, pp. 515-534, Springer.
    • (2007) Proc. TCC'07 , pp. 515-534
    • Chase, M.1
  • 9
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • ACM
    • M. Chase and S. S. M. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in Proc. CCS'09, 2009, pp. 121-130, ACM.
    • (2009) Proc. CCS'09 , pp. 121-130
    • Chase, M.1    Chow, S.S.M.2
  • 10
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • Springer
    • A. B. Lewko and B. Waters, "Decentralizing attribute-based encryption," in Proc. EUROCRYPT'11, 2011, pp. 568-588, Springer.
    • Proc. EUROCRYPT'11 , vol.2011 , pp. 568-588
    • Lewko, A.B.1    Waters, B.2
  • 11
    • 85045009877 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multi-authority cloud storage systems
    • K. Yang, X. Jia, and K. Ren, "DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems," in Proc. INFOCOM' 13, 2013, pp. 2995-3003, IEEE.
    • (2014) SpringerBriefs in Computer Science , pp. 59-83
    • Yang, K.1    Jia, X.2
  • 12
    • 85076484262 scopus 로고    scopus 로고
    • Outsourcing the decryption of abe ciphertexts
    • USENIX Association
    • M. Green, S. Hohenberger, and B.Waters, "Outsourcing the decryption of abe ciphertexts," in Proc. 20th USENIX Security Symp., 2011, pp. 1-16, USENIX Association.
    • Proc. 20th USENIX Security Symp , vol.2011 , pp. 1-16
    • Green, M.1    Hohenberger, S.2    Waters, B.3
  • 13
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • Jul
    • J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 7, pp. 1214-1221, Jul. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.1    Noh, D.K.2
  • 14
    • 84856190480 scopus 로고    scopus 로고
    • DACC: Distributed access control in clouds
    • IEEE
    • S. Ruj, A. Nayak, and I. Stojmenovic, "DACC: Distributed Access Control in Clouds," in Proc. TrustCom'11, 2011, pp. 91-98, IEEE.
    • Proc. TrustCom'11 , vol.2011 , pp. 91-98
    • Ruj, S.1    Nayak, A.2    Stojmenovic, I.3
  • 15
    • 84883129994 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multi-authority cloud storage systems
    • K. Yang, X. Jia, and K. Ren, "DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems," IACR Cryptology ePrint Archive, vol. 419, pp. 1-12, 2012.
    • (2012) IACR Cryptology EPrint Archive , vol.419 , pp. 1-12
    • Yang, K.1    Jia, X.2    Ren, K.3
  • 17
    • 85033498470 scopus 로고    scopus 로고
    • Sirius: Securing remote untrusted storage
    • The Internet Society
    • E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing remote untrusted storage," in Proc. NDSS'03, 2003, pp. 131-145, The Internet Society.
    • (2003) Proc. NDSS'03 , pp. 131-145
    • Goh, E.-J.1    Shacham, H.2    Modadugu, N.3    Boneh, D.4
  • 19
    • 74049110390 scopus 로고    scopus 로고
    • Patient controlled encryption: Ensuring privacy of electronic medical records
    • ACM
    • J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlled encryption: Ensuring privacy of electronic medical records," in Proc. CCSW'09, 2009, pp. 103-114, ACM.
    • (2009) Proc. CCSW'09 , pp. 103-114
    • Benaloh, J.1    Chase, M.2    Horvitz, E.3    Lauter, K.4
  • 20
    • 79959265831 scopus 로고    scopus 로고
    • Shared and searchable encrypted data for untrusted servers
    • C. Dong, G. Russello, and N. Dulay, "Shared and searchable encrypted data for untrusted servers," J. Comput. Security, vol. 19, no. 3, pp. 367-397, 2011.
    • (2011) J. Comput. Security , vol.19 , Issue.3 , pp. 367-397
    • Dong, C.1    Russello, G.2    Dulay, N.3
  • 21
    • 74049154660 scopus 로고    scopus 로고
    • Secure and efficient access to outsourced data
    • ACM
    • W.Wang, Z. Li, R. Owens, and B. K. Bhargava, "Secure and efficient access to outsourced data," in Proc. CCSW'09, 2009, pp. 55-66, ACM.
    • (2009) Proc. CCSW'09 , pp. 55-66
    • Wang, W.1    Li, Z.2    Owens, R.3    Bhargava, B.K.4
  • 22
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. EUROCRYPT'05, 2005, pp. 457-473, Springer. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 24
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • ACM
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. ASIACCS'10, 2010, pp. 261-270, ACM.
    • Proc. ASIACCS'10 , vol.2010 , pp. 261-270
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 25
    • 79956030125 scopus 로고    scopus 로고
    • Easier: Encryption-based access control in social networks with efficient revocation
    • ACM
    • S. Jahid, P. Mittal, and N. Borisov, "Easier: Encryption-based access control in social networks with efficient revocation," in Proc. ASIACCS' 11, 2011, pp. 411-415, ACM.
    • (2011) Proc. ASIACCS' , vol.11 , pp. 411-415
    • Jahid, S.1    Mittal, P.2    Borisov, N.3
  • 26
    • 77950867637 scopus 로고    scopus 로고
    • Secure thresholdmulti authority attribute based encryption without a central authority
    • H. Lin, Z. Cao,X. Liang, and J. Shao, "Secure thresholdmulti authority attribute based encryption without a central authority," Inf. Sci., vol. 180, no. 13, pp. 2618-2632, 2010.
    • (2010) Inf. Sci , vol.180 , Issue.13 , pp. 2618-2632
    • Lin, H.1    Caox. Liang, Z.2    Shao, J.3
  • 27
    • 84988273293 scopus 로고    scopus 로고
    • Multi-authority ciphertext-policy attribute-based encryption with accountability
    • ACM
    • J. Li, Q. Huang, X. Chen, S. S. M. Chow, D. S. Wong, and D. Xie, "Multi-authority ciphertext-policy attribute-based encryption with accountability," in Proc. ASIACCS'11, 2011, pp. 386-390, ACM.
    • Proc. ASIACCS'11 , vol.2011 , pp. 386-390
    • Li, J.1    Huang, Q.2    Chen, X.3    Chow, S.S.M.4    Wong, D.S.5    Xie, D.6
  • 28
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
    • Jan
    • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.