메뉴 건너뛰기




Volumn 42, Issue , 2014, Pages 151-164

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing

Author keywords

Attribute based encryption; Cloud computing; Data security; Data sharing; Privacy preserving; Scalability

Indexed keywords

CLOUD COMPUTING; SCALABILITY; SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS;

EID: 84897913276     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2013.12.002     Document Type: Article
Times cited : (94)

References (33)
  • 1
    • 84897914314 scopus 로고    scopus 로고
    • Amazon web services. Retrieved online from
    • Amazon web services. Retrieved online from, http://aws.amazon.com/.
  • 3
    • 77954838345 scopus 로고    scopus 로고
    • [Retrieved online on 28 December 2006 from]
    • M. Arrington Gmail disaster: reports of mass email deletions 2006 [Retrieved online on 28 December 2006 from] http://www.techcrunch.com/2006/12/ 28/gmail-disasterreports-ofmass-email-deletions/
    • (2006) Gmail Disaster: Reports of Mass Email Deletions
    • Arrington, M.1
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing Advances in Cryptology-CRYPTO 2001 Springer 213 229
    • (2001) Advances in Cryptology-CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 33645998247 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Springer
    • D. Boneh, X. Boyen, and E.J. Goh Hierarchical identity based encryption with constant size ciphertext Advances in Cryptology-EUROCRYPT 2005 Springer 562 578
    • (2005) Advances in Cryptology-EUROCRYPT , pp. 562-578
    • Boneh, D.1    Boyen, X.2    Goh, E.J.3
  • 9
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Springer
    • M. Chase Multi-authority attribute based encryption Theory of cryptography (TCC) 2007 Springer 515 534
    • (2007) Theory of Cryptography (TCC) , pp. 515-534
    • Chase, M.1
  • 11
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Springer
    • C. Cocks An identity based encryption scheme based on quadratic residues Cryptography and coding (IMACC) 2001 Springer 360 363
    • (2001) Cryptography and Coding (IMACC) , pp. 360-363
    • Cocks, C.1
  • 15
    • 84897915572 scopus 로고    scopus 로고
    • Google app engine. Retrieved online from
    • Google app engine. Retrieved online from, http://code.google.com/ appengine/.
  • 17
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Springer
    • J. Horwitz, and B. Lynn Toward hierarchical identity-based encryption Advances in Cryptology-EUROCRYPT 2002 Springer 466 481
    • (2002) Advances in Cryptology-EUROCRYPT , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 18
  • 19
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • Springer
    • M. Li, S. Yu, K. Ren, and W. Lou Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings International conference security and privacy in communication networks (SecureComm) 2010 Springer 89 106
    • (2010) International Conference Security and Privacy in Communication Networks (SecureComm) , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 21
    • 84897912387 scopus 로고    scopus 로고
    • Microsoft azure. Retrieved online from
    • Microsoft azure. Retrieved online from, http://www.microsoft.com/azure.
  • 27
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer
    • A. Shamir Identity-based cryptosystems and signature schemes Advances in cryptology 1985 Springer 47 53
    • (1985) Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 30
    • 80051514746 scopus 로고    scopus 로고
    • Achieving fine-grained access control for secure data sharing on cloud servers
    • G. Wang, Q. Liu, and J. Wu Achieving fine-grained access control for secure data sharing on cloud servers Concurrency Comput Pract Exp 23 12 2011 1443 1464
    • (2011) Concurrency Comput Pract Exp , vol.23 , Issue.12 , pp. 1443-1464
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 31
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Springer
    • B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Public key cryptography (PKC) 2011 Springer 53 70
    • (2011) Public Key Cryptography (PKC) , pp. 53-70
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.