메뉴 건너뛰기




Volumn 26, Issue , 2015, Pages 2677-2685

Fine-grained data sharing in cloud computing for mobile devices

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; COMPLEX NETWORKS; COST BENEFIT ANALYSIS; COSTS; CRYPTOGRAPHY; MOBILE DEVICES;

EID: 84954226661     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2015.7218659     Document Type: Conference Paper
Times cited : (62)

References (24)
  • 2
    • 84954294709 scopus 로고    scopus 로고
    • "Dropbox, " http: //dropbox. com.
  • 3
    • 77957936026 scopus 로고    scopus 로고
    • "Google app engine, " http: //code. google. com/appengine.
    • Google App Engine
  • 4
    • 84870639734 scopus 로고    scopus 로고
    • "Microsoft azure, " http: //microsoft. com/azure.
    • Microsoft Azure
  • 5
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and finegrained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, et al., "Achieving secure, scalable, and finegrained data access control in cloud computing, " in INFOCOM. IEEE, 2010, pp. 534-542.
    • (2010) INFOCOM. IEEE , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3
  • 6
    • 84904430840 scopus 로고    scopus 로고
    • Fine: A fine-grained privacy-preserving location-based service framework for mobile devices
    • J. Shao, R. Lu, and X. Lin, "Fine: A fine-grained privacy-preserving location-based service framework for mobile devices, " in INFOCOM. IEEE, 2014, pp. 244-252.
    • (2014) INFOCOM. IEEE , pp. 244-252
    • Shao, J.1    Lu, R.2    Lin, X.3
  • 7
    • 0027764777 scopus 로고
    • A cryptographic file system for UNIX
    • M. Blaze, "A cryptographic file system for UNIX, " in CCS. ACM, 1993, pp. 9-16.
    • (1993) CCS. ACM , pp. 9-16
    • Blaze, M.1
  • 8
    • 84978405320 scopus 로고    scopus 로고
    • FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
    • A. Adya, W. J. Bolosky, M. Castro, et al., "FARSITE: Federated, available, and reliable storage for an incompletely trusted environment, " in OSDI. USENIX, 2002, pp. 1-14
    • (2002) OSDI. USENIX , pp. 14
    • Adya, A.1    Bolosky, W.J.2    Castro, M.3
  • 10
    • 85033460636 scopus 로고    scopus 로고
    • Plutus: Scalable secure file sharing on untrusted storage
    • M. Kallahalla, E. Riedel, R. Swaminathan, et al., "Plutus: Scalable secure file sharing on untrusted storage, " in FAST. USENIX, 2003.
    • (2003) FAST. USENIX
    • Kallahalla, M.1    Riedel, E.2    Swaminathan, R.3
  • 11
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, et al., "Improved proxy re-encryption schemes with applications to secure distributed storage, " in NDSS. The Internet Society, 2005.
    • (2005) NDSS. the Internet Society
    • Ateniese, G.1    Fu, K.2    Green, M.3
  • 12
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine grained access control of encrypted data, " in CCS. ACM 2006, pp. 89-98.
    • (2006) CCS. ACM , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 13
    • 84883281346 scopus 로고    scopus 로고
    • Improving security and efficiency in attribute-based data sharing
    • J. Hur, "Improving security and efficiency in attribute-based data sharing, " IEEE Transactions on Knowledge and Data Engineering. Vol. 25, No. 10, 2013, pp. 2271-2282.
    • (2013) IEEE Transactions on Knowledge and Data Engineering. , vol.25 , Issue.10 , pp. 2271-2282
    • Hur, J.1
  • 15
    • 84958540552 scopus 로고    scopus 로고
    • Online/offline attribute-based encryption
    • Springer
    • S. Hohenberger and B. Waters, "Online/offline attribute-based encryption, " in Public Key Cryptography, LNCS, vol. 8383. Springer, 2014, pp. 293-310.
    • (2014) Public Key Cryptography, LNCS , vol.8383 , pp. 293-310
    • Hohenberger, S.1    Waters, B.2
  • 16
    • 84889034631 scopus 로고    scopus 로고
    • Practical constructions and new proof methods for large universe attribute-based encryption
    • Y. Rouselakis and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption, " in CCS. ACM, 2013, pp. 463-474.
    • (2013) CCS. ACM , pp. 463-474
    • Rouselakis, Y.1    Waters, B.2
  • 17
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms. " IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 18
    • 84954294711 scopus 로고    scopus 로고
    • http: //crypto. stanford. edu/pbc/.
  • 19
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Springer
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in EUROCRYPT, LNCS, vol. 1403. Springer, 1998, pp. 127-144.
    • (1998) EUROCRYPT, LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 20
    • 67650135696 scopus 로고    scopus 로고
    • Key-private proxy reencryption
    • Springer
    • G. Ateniese, K. Benson, and S. Hohenberger, "Key-private proxy reencryption, " in CT-RSA, LNCS, vol. 5473. Springer, 2009, pp. 279-294.
    • (2009) CT-RSA, LNCS , vol.5473 , pp. 279-294
    • Ateniese, G.1    Benson, K.2    Hohenberger, S.3
  • 21
    • 52149099038 scopus 로고    scopus 로고
    • Tracing malicious proxies in proxy reencryption
    • Springer
    • B. Libert and D. Vergnaud, "Tracing malicious proxies in proxy reencryption, " in Pairing, LNCS, vol. 5209. Springer, 2008, pp. 332-353.
    • (2008) Pairing, LNCS , vol.5209 , pp. 332-353
    • Libert, B.1    Vergnaud, D.2
  • 22
    • 79251541771 scopus 로고    scopus 로고
    • Sccr: A generic approach to simultaneously achieve cca security and collusion-resistance in proxy re-encryption
    • J. Shao, Z. Cao, and P. Liu, "Sccr: a generic approach to simultaneously achieve cca security and collusion-resistance in proxy re-encryption, " Security and Communication Networks, vol. 4, no. 2, pp. 122-135, 2011.
    • (2011) Security and Communication Networks , vol.4 , Issue.2 , pp. 122-135
    • Shao, J.1    Cao, Z.2    Liu, P.3
  • 23
    • 58549086614 scopus 로고    scopus 로고
    • Type-based proxy re-encryption and its construction
    • Q. Tang, "Type-based proxy re-encryption and its construction, " in INDOCRYPT, 2008, pp. 130-144.
    • (2008) INDOCRYPT , pp. 130-144
    • Tang, Q.1
  • 24
    • 77952362084 scopus 로고    scopus 로고
    • Attribute Based Proxy Reencryption with Delegating Capabilities
    • X. Liang, Z. Cao, H. Lin, and J. Shao, "Attribute Based Proxy Reencryption with Delegating Capabilities, " in ACM ASIACCS 2009, 2009, pp. 276-286.
    • (2009) ACM ASIACCS 2009 , pp. 276-286
    • Liang, X.1    Cao, Z.2    Lin, H.3    Shao, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.