메뉴 건너뛰기




Volumn 25, Issue 2, 2014, Pages 384-394

Decentralized access control with anonymous authentication of data stored in clouds

Author keywords

Access control; attribute based encryption; attribute based signatures; authentication; cloud storage

Indexed keywords

CLOUD STORAGE; CRYPTOGRAPHY;

EID: 84891761004     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2013.38     Document Type: Article
Times cited : (213)

References (39)
  • 2
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • Ar-June
    • C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
    • (2012) IEEE Trans. Services Computing , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 3
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, Fuzzy Keyword Search Over Encrypted Data in Cloud Computing, Proc. IEEE INFOCOM, pp. 441-445, 2010.
    • (2010) Proc. IEEE INFOCOM , pp. 441-445
    • Li, J.1    Wang, Q.2    Wang, C.3    Cao, N.4    Ren, K.5    Lou, W.6
  • 6
    • 77649261628 scopus 로고    scopus 로고
    • A fully homomorphic encryption scheme
    • Stanford Univ.
    • C. Gentry, A Fully Homomorphic Encryption Scheme, PhD dissertation, Stanford Univ., http://www.crypto.stanford.edu/craig, 2009.
    • (2009) PhD Dissertation
    • Gentry, C.1
  • 11
    • 77953350247 scopus 로고    scopus 로고
    • Adding attributes to role-based access control
    • June
    • D.R. Kuhn, E.J. Coyne, and T.R. Weil, Adding Attributes to Role-Based Access Control, IEEE Computer, vol. 43, no. 6, pp. 79-81, June 2010.
    • (2010) IEEE Computer , vol.43 , Issue.6 , pp. 79-81
    • Kuhn, D.R.1    Coyne, E.J.2    Weil, T.R.3
  • 12
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • M. Li, S. Yu, K. Ren, and W. Lou, Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings, Proc. Sixth Int'l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 89-106, 2010.
    • (2010) Proc. Sixth Int'l ICST Conf. Security and Privacy in Comm. Networks (SecureComm) , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 14
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • G. Wang, Q. Liu, and J. Wu, Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services, Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.
    • (2010) Proc. 17th ACM Conf. Computer and Comm. Security (CCS) , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 17
    • 85194053944 scopus 로고    scopus 로고
    • http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf, 2013.
    • (2013)
  • 18
    • 85194044443 scopus 로고    scopus 로고
    • http://securesoftwaredev.com/2012/08/20/xacml-in-the-cloud, 2013.
    • (2013)
  • 20
    • 84946833891 scopus 로고    scopus 로고
    • How to Leak a Secret
    • Advances in Cryptology - ASIACRYPT 2001
    • R.L. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), pp. 552-565, 2001. (Pubitemid 33371206)
    • (2002) Lecture Notes in Computer Science , Issue.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 23
  • 25
    • 0003745894 scopus 로고    scopus 로고
    • Secure schemes for secret sharing and key distribution
    • Technion, Haifa
    • A. Beimel, Secure Schemes for Secret Sharing and Key Distribution, PhD thesis, Technion, Haifa, 1996.
    • (1996) PhD Thesis
    • Beimel, A.1
  • 26
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Proc. Ann. Int'l Conf. Advances in Cryptology (EUROCRYPT), pp. 457-473, 2005. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 27
  • 28
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007. (Pubitemid 47432538)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 31
    • 58749115565 scopus 로고    scopus 로고
    • Secure threshold multi-authority attribute based encryption without a central authority
    • H. Lin, Z. Cao, X. Liang, and J. Shao, Secure Threshold Multi-Authority Attribute Based Encryption without a Central Authority, Proc. Progress in Cryptology Conf. (INDOCRYPT), pp. 426-436, 2008.
    • (2008) Proc. Progress in Cryptology Conf. (INDOCRYPT) , pp. 426-436
    • Lin, H.1    Cao, Z.2    Liang, X.3    Shao, J.4
  • 32
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • M. Chase and S.S.M. Chow, Improving Privacy and Security in Multi-Authority Attribute-Based Encryption, Proc. ACM Conf. Computer and Comm. Security, pp. 121-130, 2009.
    • (2009) Proc. ACM Conf. Computer and Comm. Security , pp. 121-130
    • Chase, M.1    Chow, S.S.M.2
  • 34
    • 85045009877 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multi-authority cloud storage systems
    • K. Yang, X. Jia, and K. Ren, DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems, IACR Cryptology ePrint Archive, p. 419, 2012.
    • (2014) SpringerBriefs in Computer Science , pp. 59-83
    • Yang, K.1    Jia, X.2
  • 36
    • 85194048740 scopus 로고    scopus 로고
    • http://crypto.stanford.edu/pbc/, 2013.
    • (2013)
  • 39
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • July
    • J. Hur and D. Kun Noh, Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011. Canada
    • (2011) IEEE Trans. Parallel and Distributed Systems , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.1    Kun Noh, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.