메뉴 건너뛰기




Volumn , Issue , 2014, Pages 725-730

Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; ENERGY UTILIZATION; MOBILE DEVICES; PUBLIC KEY CRYPTOGRAPHY;

EID: 84906994292     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2014.6883405     Document Type: Conference Paper
Times cited : (153)

References (24)
  • 1
    • 84876013879 scopus 로고    scopus 로고
    • IHEMS: An information-centric approach to secure home energy management
    • J. Zhang, Q. Li, and E. M. Schooler, "iHEMS: An Information-Centric Approach to Secure Home Energy Management," in Proc. of IEEE SmartGridComm, 2012.
    • (2012) Proc. of IEEE SmartGridComm
    • Zhang, J.1    Li, Q.2    Schooler, E.M.3
  • 4
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of ACM CCS, pp. 89-98, 2006.
    • (2006) Proc. of ACM CCS , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 5
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attributebased encryption
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. of IEEE SP, pp. 321-334, 2007.
    • (2007) Proc. of IEEE SP , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 6
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of IEEE INFOCOM, pp. 1-9, 2010.
    • (2010) Proc. of IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 7
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. of ACM CCS, pp. 735-737, 2010.
    • (2010) Proc. of ACM CCS , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 8
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • Springer
    • M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in Security and Privacy in Communication Networks, pp. 89-106, Springer, 2010.
    • (2010) Security and Privacy in Communication Networks , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 9
    • 84863392301 scopus 로고    scopus 로고
    • Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
    • Z. Wan, J. Liu, and R. H. Deng, "Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743-754, 2012.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 12
  • 14
    • 77953904148 scopus 로고    scopus 로고
    • Recommendation for key management-part 1: General (revision 3)
    • E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for key management-part 1: General (revision 3)," NIST special publication, vol. 800, p. 57, 2011.
    • (2011) NIST Special Publication , vol.800 , pp. 57
    • Barker, E.1    Barker, W.2    Burr, W.3    Polk, W.4    Smid, M.5
  • 18
    • 84868320122 scopus 로고    scopus 로고
    • Outsourcing encryption of attributebased encryption with mapreduce
    • Springer
    • J. Li, C. Jia, J. Li, and X. Chen, "Outsourcing encryption of attributebased encryption with mapreduce," in Information and Communications Security, pp. 191-201, Springer, 2012.
    • (2012) Information and Communications Security , pp. 191-201
    • Li, J.1    Jia, C.2    Li, J.3    Chen, X.4
  • 19
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • ACM
    • R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. of ACM CCS, pp. 195-203, ACM, 2007.
    • (2007) Proc. of ACM CCS , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 22
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Springer
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Public Key Cryptography, pp. 53-70, Springer, 2011.
    • (2011) Public Key Cryptography , pp. 53-70
    • Waters, B.1
  • 23
    • 84881510395 scopus 로고    scopus 로고
    • A survey on attributebased encryption schemes of access control in cloud environments
    • C.-C. Lee, P.-S. Chung, and M.-S. Hwang, "A survey on attributebased encryption schemes of access control in cloud environments," International Journal of Network Security, vol. 15, pp. 231-240, 2013.
    • (2013) International Journal of Network Security , vol.15 , pp. 231-240
    • Lee, C.-C.1    Chung, P.-S.2    Hwang, M.-S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.