메뉴 건너뛰기




Volumn 9327, Issue , 2015, Pages 146-166

Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84951824554     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-24177-7_8     Document Type: Conference Paper
Times cited : (87)

References (36)
  • 1
    • 72449201970 scopus 로고    scopus 로고
    • Attribute-based encryption supporting direct/indirect revocation modes
    • Parker, M.G. (ed.), Springer, Heidelberg, LNCS, vol. 5921
    • Attrapadung, N., Imai, H.: Attribute-based encryption supporting direct/indirect revocation modes. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 278-300. Springer, Heidelberg (2009)
    • (2009) Cryptography and Coding 2009 , pp. 278-300
    • Attrapadung, N.1    Imai, H.2
  • 2
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Nyberg, K. (ed.), Springer, Heidelberg, LNCS, vol. 1403
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) EUROCRYPT 1998 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 3
    • 85084163661 scopus 로고    scopus 로고
    • A method for fast revocation of public key certificates and security capabilities
    • Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: Proceedings of USENIX Security (2001)
    • (2001) Proceedings of USENIX Security
    • Boneh, D.1    Ding, X.2    Tsudik, G.3    Wong, C.M.4
  • 5
    • 84961584112 scopus 로고    scopus 로고
    • Legal issues in the cloud
    • Choo, K.K.R.: Legal issues in the cloud. IEEE Cloud Comput. 1(1), 94-96 (2014)
    • (2014) IEEE Cloud Comput , vol.1 , Issue.1 , pp. 94-96
    • Choo, K.K.R.1
  • 6
    • 33745818483 scopus 로고    scopus 로고
    • Security-mediated certificateless cryptography
    • Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.), Springer, Heidelberg, LNCS, vol. 3958
    • Chow, S.S.M., Boyd, C., González Nieto, J.M.: Security-mediated certificateless cryptography. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 508-524. Springer, Heidelberg (2006)
    • (2006) PKC 2006 , pp. 508-524
    • Chow, S.S.M.1    Boyd, C.2    González Nieto, J.M.3
  • 7
    • 84991821017 scopus 로고    scopus 로고
    • Fully-RCCA-CCA-Secure ciphertext-policy attribute based encryption with security mediator
    • Chen, Y., Jiang, L., Yiu, S., Au, M., Xuan, W.: Fully-RCCA-CCA-Secure ciphertext-policy attribute based encryption with security mediator. In: Proceedings of ICICS 2014 (2014)
    • (2014) Proceedings of ICICS 2014
    • Chen, Y.1    Jiang, L.2    Yiu, S.3    Au, M.4    Xuan, W.5
  • 10
    • 78649245892 scopus 로고    scopus 로고
    • European Network and Information Security Agency: Cloud computing risk assessment (2009). http://www.enisa.europa.eu/act/rm/files/deliverables/ cloud-computing-risk-assessment
    • (2009) Cloud computing risk assessment
  • 13
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for finegrained access control of encrypted data
    • Goyal, V., Pandy, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Proceedings of ACM CCS 2006, pp. 89-98 (2006)
    • (2006) Proceedings of ACM CCS 2006 , pp. 89-98
    • Goyal, V.1    Pandy, O.2    Sahai, A.3    Waters, B.4
  • 14
    • 84958540552 scopus 로고    scopus 로고
    • Online/offline attribute-based encryption
    • Krawczyk, H. (ed.), Springer, Heidelberg, LNCS, vol. 8383
    • Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293-310. Springer, Heidelberg (2014)
    • (2014) PKC 2014 , pp. 293-310
    • Hohenberger, S.1    Waters, B.2
  • 15
    • 84901649741 scopus 로고    scopus 로고
    • TIMER: Secure and reliable cloud storage against data re-outsourcing
    • Huang, X., Zhou, J. (eds.), Springer, Heidelberg, LNCS, vol. 8434
    • Jiang, T., Chen, X., Li, J., Wong, D.S., Ma, J., Liu, J.: TIMER: secure and reliable cloud storage against data re-outsourcing. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 346-358. Springer, Heidelberg (2014)
    • (2014) ISPEC 2014 , pp. 346-358
    • Jiang, T.1    Chen, X.2    Li, J.3    Wong, D.S.4    Ma, J.5    Liu, J.6
  • 17
    • 84906492583 scopus 로고    scopus 로고
    • GO-ABE: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
    • Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: GO-ABE: an efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Proceedings of ESORICS 2014, pp. 257-272 (2014)
    • (2014) Proceedings of ESORICS 2014 , pp. 257-272
    • Liang, K.1    Liu, J.K.2    Wong, D.S.3    Susilo, W.4
  • 18
    • 84933040096 scopus 로고    scopus 로고
    • Privacy-preserving ciphertext multi-sharing control for big data storage
    • Liang, K., Susilo, W., Liu, J.K.: Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10(8), 1578-1589 (2015)
    • (2015) IEEE Trans. Inf. Forensics Secur , vol.10 , Issue.8 , pp. 1578-1589
    • Liang, K.1    Susilo, W.2    Liu, J.K.3
  • 19
    • 84926642709 scopus 로고    scopus 로고
    • Secure sharing and searching for real-time video data in mobile cloud
    • Liu, J.K., Au, M.H., Susilo, W., Liang, K., Lu, R., Srinivasan, B.: Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2), 46-50 (2015)
    • (2015) IEEE Netw , vol.29 , Issue.2 , pp. 46-50
    • Liu, J.K.1    Au, M.H.2    Susilo, W.3    Liang, K.4    Lu, R.5    Srinivasan, B.6
  • 20
    • 84908672589 scopus 로고    scopus 로고
    • GO-ABE: Group-oriented attribute-based encryption
    • Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.), Springer, Heidelberg, LNCS, vol. 8792
    • Li, M., Huang, X., Liu, J.K., Xu, L.: GO-ABE: group-oriented attribute-based encryption. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 260-270. Springer, Heidelberg (2014)
    • (2014) NSS 2014 , pp. 260-270
    • Li, M.1    Huang, X.2    Liu, J.K.3    Xu, L.4
  • 22
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Kilian, J. (ed.), Springer, Heidelberg, LNCS, vol. 2139
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 23
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with nonmonotonic access structures
    • Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: Proceedings of ACM CCS 2007, pp. 195-203 (2007)
    • (2007) Proceedings of ACM CCS 2007 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 25
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Fumy, W. (ed.), Springer, Heidelberg, LNCS, vol. 1233
    • Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
    • (1997) EUROCRYPT 1997 , pp. 256-266
    • Shoup, V.1
  • 26
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • Safavi-Naini, R., Canetti, R. (eds.), Springer, Heidelberg, LNCS, vol. 7417
    • Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
    • (2012) CRYPTO 2012 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 27
    • 84976779342 scopus 로고
    • Fast probabilistic algorithms for verification of polynomial identities
    • Schwartz, J.T.: Fast probabilistic algorithms for verification of polynomial identities. J. ACM 27(4), 701-717 (1980)
    • (1980) J. ACM , vol.27 , Issue.4 , pp. 701-717
    • Schwartz, J.T.1
  • 28
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg, LNCS, vol. 6571
    • Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
    • (2011) PKC 2011 , pp. 53-70
    • Waters, B.1
  • 29
    • 78649998200 scopus 로고    scopus 로고
    • Hierarhical attribute-based encryption for fine-grained access control in cloud storage services
    • Wang, G., Liu, Q., Wu, J.: Hierarhical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of ACM CCS 2010, pp. 735-737 (2010)
    • (2010) Proceedings of ACM CCS 2010 , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 30
    • 84903121888 scopus 로고    scopus 로고
    • Expressive, efficient, and revocable data access control for multiauthority cloud storage
    • Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multiauthority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735-1744 (2014)
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.7 , pp. 1735-1744
    • Yang, K.1    Jia, X.2
  • 31
    • 84886903289 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multiauthority cloud storage systems
    • Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790-1801 (2013)
    • (2013) IEEE Trans. Inf. Forensics Secur , vol.8 , Issue.11 , pp. 1790-1801
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4    Xie, R.5
  • 32
    • 84951742592 scopus 로고    scopus 로고
    • Achieving revocable fine-grained cryptographic access control over cloud data
    • Yang, Y., Ding, X., Lu, H., Wan, Z., Zhou, J.: Achieving revocable fine-grained cryptographic access control over cloud data. In: Proceedings of ISC 2013 (2013)
    • (2013) Proceedings of ISC 2013
    • Yang, Y.1    Ding, X.2    Lu, H.3    Wan, Z.4    Zhou, J.5
  • 33
    • 84910007051 scopus 로고    scopus 로고
    • Fine-grained conditional proxy re-encryption and application
    • Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.), Springer, Heidelberg. Extended version to appear: Pervasive and Mobile Computing, ELSEVIER, LNCS, vol. 8782
    • Yang, Y., Lu, H., Weng, J., Zhang, Y., Sakurai, K.: Fine-grained conditional proxy re-encryption and application. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 206-222. Springer, Heidelberg (2014). Extended version to appear: Pervasive and Mobile Computing, ELSEVIER
    • (2014) ProvSec 2014 , pp. 206-222
    • Yang, Y.1    Lu, H.2    Weng, J.3    Zhang, Y.4    Sakurai, K.5
  • 34
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained aata access control in cloud computing
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained aata access control in cloud computing. In: Proceedings of IEEE INFOCOM 2010 (2010)
    • (2010) Proceedings of IEEE INFOCOM 2010
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 35
    • 84906492508 scopus 로고    scopus 로고
    • Identity-based encryption with postchallenge auxiliary inputs for secure cloud applications and sensor networks
    • Kuty_lowski, M., Vaidya, J. (eds.), Springer, Heidelberg, LNCS, vol. 8712
    • Yuen, T.H., Zhang, Y., Yiu, S.M., Liu, J.K.: Identity-based encryption with postchallenge auxiliary inputs for secure cloud applications and sensor networks. In: Kuty_lowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 130-147. Springer, Heidelberg (2014)
    • (2014) ICAIS 2014, Part I , pp. 130-147
    • Yuen, T.H.1    Zhang, Y.2    Yiu, S.M.3    Liu, J.K.4
  • 36
    • 84925463455 scopus 로고
    • Probabilistic algorithms for sparse polynomials
    • Ng, K.W. (ed.), Springer, Heidelberg, LNCS, vol. 72
    • Zippel, R.: Probabilistic algorithms for sparse polynomials. In: Ng, K.W. (ed.) EUROSAM/ISSAC 1979. LNCS, vol. 72, pp. 216-226. Springer, Heidelberg (1979)
    • (1979) EUROSAM/ISSAC 1979 , pp. 216-226
    • Zippel, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.