메뉴 건너뛰기




Volumn 10, Issue 1, 2015, Pages 190-199

Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption

Author keywords

Anonymity; attribute based encryption; multi authority

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; DATA PRIVACY; DIGITAL STORAGE;

EID: 84919829652     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2368352     Document Type: Article
Times cited : (162)

References (41)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Berlin, Germany: Springer-Verlag
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47-53.
    • (1985) Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 2
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Berlin, Germany: Springer-Verlag
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457-473.
    • (2005) Advances in Cryptology. , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 3
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. 13th CCS, 2006, pp. 89-98.
    • (2006) Proc. 13th CCS , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 4
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attributebased encryption
    • May
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE SP, May 2007, pp. 321-334.
    • (2007) Proc. IEEE SP , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 5
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Berlin, Germany: Springer-Verlag
    • M. Chase, "Multi-authority attribute based encryption," in Theory of Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515-534.
    • (2007) Theory of Cryptography. , pp. 515-534
    • Chase, M.1
  • 6
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • M. Chase and S. S. M. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in Proc. 16th CCS, 2009, pp. 121-130.
    • (2009) Proc. 16th CCS , pp. 121-130
    • Chase, M.1    Chow, S.S.M.2
  • 7
    • 77950867637 scopus 로고    scopus 로고
    • Secure threshold multi authority attribute based encryption without a central authority
    • H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority," Inf. Sci., vol. 180, no. 13, pp. 2618-2632, 2010.
    • (2010) Inf. Sci. , vol.180 , Issue.13 , pp. 2618-2632
    • Lin, H.1    Cao, Z.2    Liang, X.3    Shao, J.4
  • 8
    • 84856905411 scopus 로고    scopus 로고
    • Multi-authority attribute-based encryption with honest-but-curious central authority
    • V. Božović, D. Socek, R. Steinwandt, and V. I. Villányi, "Multi-authority attribute-based encryption with honest-but-curious central authority," Int. J. Comput. Math., vol. 89, no. 3, pp. 268-283, 2012.
    • (2012) Int. J. Comput. Math. , vol.89 , Issue.3 , pp. 268-283
    • Božović, V.1    Socek, D.2    Steinwandt, R.3    Villányi, V.I.4
  • 9
    • 84880914747 scopus 로고    scopus 로고
    • Low complexity multi-authority attribute based encryption scheme for mobile cloud computing
    • Mar.
    • F. Li, Y. Rahulamathavan, M. Rajarajan, and R. C.-W. Phan, "Low complexity multi-authority attribute based encryption scheme for mobile cloud computing," in Proc. IEEE 7th SOSE, Mar. 2013, pp. 573-577.
    • (2013) Proc. IEEE 7th SOSE , pp. 573-577
    • Li, F.1    Rahulamathavan, Y.2    Rajarajan, M.3    Phan, R.C.-W.4
  • 10
    • 84883076035 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multi-authority cloud storage systems
    • Apr.
    • K. Yang, X. Jia, K. Ren, and B. Zhang, "DAC-MACS: Effective data access control for multi-authority cloud storage systems," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2895-2903.
    • (2013) Proc. IEEE INFOCOM , pp. 2895-2903
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4
  • 11
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • Berlin, Germany: Springer-Verlag
    • A. Lewko and B. Waters, "Decentralizing attribute-based encryption," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2011, pp. 568-588.
    • (2011) Advances in Cryptology. , pp. 568-588
    • Lewko, A.1    Waters, B.2
  • 12
    • 69649105305 scopus 로고    scopus 로고
    • On multi-authority ciphertext-policy attribute-based encryption
    • S. Müller, S. Katzenbeisser, and C. Eckert, "On multi-authority ciphertext-policy attribute-based encryption," Bull. Korean Math. Soc., vol. 46, no. 4, pp. 803-819, 2009.
    • (2009) Bull. Korean Math. Soc. , vol.46 , Issue.4 , pp. 803-819
    • Müller, S.1    Katzenbeisser, S.2    Eckert, C.3
  • 13
    • 84988273293 scopus 로고    scopus 로고
    • Multiauthority ciphertext-policy attribute-based encryption with accountability
    • J. Li, Q. Huang, X. Chen, S. S. Chow, D. S. Wong, and D. Xie, "Multiauthority ciphertext-policy attribute-based encryption with accountability," in Proc. 6th ASIACCS, 2011, pp. 386-390.
    • (2011) Proc. 6th ASIACCS , pp. 386-390
    • Li, J.1    Huang, Q.2    Chen, X.3    Chow, S.S.4    Wong, D.S.5    Xie, D.6
  • 14
    • 84877041512 scopus 로고    scopus 로고
    • Fully secure multi-authority attribute-based traitor tracing
    • H. Ma, G. Zeng, Z. Wang, and J. Xu, "Fully secure multi-authority attribute-based traitor tracing," J. Comput. Inf. Syst., vol. 9, no. 7, pp. 2793-2800, 2013.
    • (2013) J. Comput. Inf. Syst. , vol.9 , Issue.7 , pp. 2793-2800
    • Ma, H.1    Zeng, G.2    Wang, Z.3    Xu, J.4
  • 15
    • 84873974141 scopus 로고    scopus 로고
    • Attribute-based encryption with fast decryption
    • Berlin, Germany: Springer-Verlag
    • S. Hohenberger and B. Waters, "Attribute-based encryption with fast decryption," in Public-Key Cryptography. Berlin, Germany: Springer-Verlag, 2013, pp. 162-179.
    • (2013) Public-Key Cryptography , pp. 162-179
    • Hohenberger, S.1    Waters, B.2
  • 16
    • 84885145341 scopus 로고    scopus 로고
    • Attribute-based secure data sharing with hidden policies in smart grid
    • Nov.
    • J. Hur, "Attribute-based secure data sharing with hidden policies in smart grid," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 11, pp. 2171-2180, Nov. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.11 , pp. 2171-2180
    • Hur, J.1
  • 17
    • 84878002758 scopus 로고    scopus 로고
    • Anonymous attributebased encryption supporting efficient decryption test
    • Y. Zhang, X. Chen, J. Li, D. S. Wong, and H. Li, "Anonymous attributebased encryption supporting efficient decryption test," in Proc. 8th ASIACCS, 2013, pp. 511-516.
    • (2013) Proc. 8th ASIACCS , pp. 511-516
    • Zhang, Y.1    Chen, X.2    Li, J.3    Wong, D.S.4    Li, H.5
  • 18
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Berlin, Germany: Springer-Verlag
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2001, pp. 213-229.
    • (2001) Advances in Cryptology , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 19
    • 33645998872 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Berlin, Germany: Springer-Verlag
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005.
    • (2005) Advances in Cryptology
    • Sahai, A.1    Waters, B.2
  • 20
    • 79956315357 scopus 로고    scopus 로고
    • Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing
    • Berlin, Germany: Springer-Verlag
    • J. Liu, Z. Wan, and M. Gu, "Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing," in Information Security Practice and Experience. Berlin, Germany: Springer-Verlag, 2011, pp. 98-107.
    • (2011) Information Security Practice and Experience , pp. 98-107
    • Liu, J.1    Wan, Z.2    Gu, M.3
  • 21
    • 34548769073 scopus 로고    scopus 로고
    • Attribute-based publishing with hidden credentials and hidden policies
    • A. Kapadia, P. P. Tsang, and S. W. Smith, "Attribute-based publishing with hidden credentials and hidden policies," in Proc. NDSS, 2007, pp. 179-192.
    • (2007) Proc. NDSS , pp. 179-192
    • Kapadia, A.1    Tsang, P.P.2    Smith, S.W.3
  • 22
    • 58049192731 scopus 로고    scopus 로고
    • Attribute-based content distribution with hidden policy
    • Oct.
    • S. Yu, K. Ren, and W. Lou, "Attribute-based content distribution with hidden policy," in Proc. 4th Workshop Secure Netw. Protocols, Oct. 2008, pp. 39-44.
    • (2008) Proc. 4th Workshop Secure Netw. Protocols , pp. 39-44
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 23
    • 84863392301 scopus 로고    scopus 로고
    • HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing
    • Apr.
    • Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 24
    • 84883089676 scopus 로고    scopus 로고
    • Privacypreserving data aggregation without secure channel: Multivariate polynomial evaluation
    • Apr.
    • T. Jung, X. Mao, X.-Y. Li, S.-J. Tang, W. Gong, and L. Zhang, "Privacypreserving data aggregation without secure channel: Multivariate polynomial evaluation," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2634-2642.
    • (2013) Proc. IEEE INFOCOM , pp. 2634-2642
    • Jung, T.1    Mao, X.2    Li, X.-Y.3    Tang, S.-J.4    Gong, W.5    Zhang, L.6
  • 25
    • 84927654398 scopus 로고    scopus 로고
    • Collusion-tolerable privacy-preserving sum and product calculation without secure channel
    • to be published
    • T. Jung and X.-Y. Li, "Collusion-tolerable privacy-preserving sum and product calculation without secure channel," IEEE Trans. Dependable Secure Comput., to be published.
    • IEEE Trans. Dependable Secure Comput.
    • Jung, T.1    Li, X.-Y.2
  • 26
    • 84883115549 scopus 로고    scopus 로고
    • Search me if you can: Privacy-preserving location query service
    • Apr.
    • X.-Y. Li and T. Jung, "Search me if you can: Privacy-preserving location query service," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2760-2768.
    • (2013) Proc. IEEE INFOCOM , pp. 2760-2768
    • Li, X.-Y.1    Jung, T.2
  • 27
    • 84883129081 scopus 로고    scopus 로고
    • Verifiable private multiparty computation: Ranging and ranking
    • Apr.
    • L. Zhang, X.-Y. Li, Y. Liu, and T. Jung, "Verifiable private multiparty computation: Ranging and ranking," in Proc. IEEE INFOCOM, Apr. 2013, pp. 605-609.
    • (2013) Proc. IEEE INFOCOM , pp. 605-609
    • Zhang, L.1    Li, X.-Y.2    Liu, Y.3    Jung, T.4
  • 28
    • 84893264480 scopus 로고    scopus 로고
    • Message in a sealed bottle: Privacy preserving friending in social networks
    • Jul.
    • L. Zhang, X.-Y. Li, and Y. Liu, "Message in a sealed bottle: Privacy preserving friending in social networks," in Proc. IEEE 33rd ICDCS, Jul. 2013, pp. 327-336.
    • (2013) Proc. IEEE 33rd ICDCS , pp. 327-336
    • Zhang, L.1    Li, X.-Y.2    Liu, Y.3
  • 29
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Mar.
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 30
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • Apr.
    • C. Wang, K. Ren, and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing," in Proc. IEEE INFOCOM, Apr. 2011, pp. 820-828.
    • (2011) Proc. IEEE INFOCOM , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 31
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • Jun.
    • C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE 30th ICDCS, Jun. 2010, pp. 253-262.
    • (2010) Proc. IEEE 30th ICDCS , pp. 253-262
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 32
    • 79551533095 scopus 로고    scopus 로고
    • Rumor riding: Anonymizing unstructured peer-to-peer systems
    • Mar.
    • Y. Liu, J. Han, and J. Wang, "Rumor riding: Anonymizing unstructured peer-to-peer systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 3, pp. 464-475, Mar. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.3 , pp. 464-475
    • Liu, Y.1    Han, J.2    Wang, J.3
  • 33
    • 84919828919 scopus 로고    scopus 로고
    • [Online]. Available accessed 2014
    • Tor: Anonymized Network. [Online]. Available: https://www.torproject.org/, accessed 2014.
    • Tor: Anonymized Network.
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 35
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation," in Proc. 31st STOC, 1999, pp. 245-254.
    • (1999) Proc. 31st STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 36
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol. 28, no. 6, pp. 637-647, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 37
    • 1342345050 scopus 로고    scopus 로고
    • Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
    • Feb.
    • W.-G. Tzeng, "Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters," IEEE Trans. Comput., vol. 53, no. 2, pp. 232-240, Feb. 2004.
    • (2004) IEEE Trans. Comput. , vol.53 , Issue.2 , pp. 232-240
    • Tzeng, W.-G.1
  • 39
    • 84911191578 scopus 로고    scopus 로고
    • Efficient user revocation for privacy-aware PKI
    • W. Ren, K. Ren, W. Lou, and Y. Zhang, "Efficient user revocation for privacy-aware PKI," in Proc. ICST, 2008, Art. ID 11.
    • (2008) Proc. ICST
    • Ren, W.1    Ren, K.2    Lou, W.3    Zhang, Y.4
  • 40
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
    • Jan.
    • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 41
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. 5th ASIACCS, 2010, pp. 261-270.
    • (2010) Proc. 5th ASIACCS , pp. 261-270
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.