메뉴 건너뛰기




Volumn 26, Issue 12, 2015, Pages 3461-3470

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud

Author keywords

ABAC; ABE; Access Control; Big Data; Cloud; Outsourcing; Policy Updating

Indexed keywords

ACCESS CONTROL; CLOUDS; CRYPTOGRAPHY; DATA HANDLING; OUTSOURCING;

EID: 84961742903     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2014.2380373     Document Type: Article
Times cited : (132)

References (16)
  • 6
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing, " in Proc. 29th Conf. Inform. Commun., 2010, pp. 534-542.
    • (2010) Proc. 29th Conf. Inform. Commun , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 7
    • 84877948269 scopus 로고    scopus 로고
    • Attribute-based fine-grained access control with efficient revocation in cloud storage systems
    • K. Yang, X. Jia, and K. Ren, "Attribute-based fine-grained access control with efficient revocation in cloud storage systems, " in Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security, 2013, pp. 523-528.
    • (2013) Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security , pp. 523-528
    • Yang, K.1    Jia, X.2    Ren, K.3
  • 8
    • 84886903289 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multiauthority cloud storage systems
    • Nov
    • K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, "DAC-MACS: Effective data access control for multiauthority cloud storage systems, " IEEE Trans.Inform. Forensics Secur., vol. 8, no. 11, pp.1790-1801, Nov.2013
    • (2013) IEEE Trans.Inform. Forensics Secur , vol.8 , Issue.11 , pp. 1790-1801
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4    Xie, R.5
  • 9
    • 84903121888 scopus 로고    scopus 로고
    • Expressive, efficient, and revocable data access control for multi-Authority cloud storage
    • Jul
    • K. Yang and X. Jia, "Expressive, efficient, and revocable data access control for multi-Authority cloud storage, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735-1744, Jul. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.7 , pp. 1735-1744
    • Yang, K.1    Jia, X.2
  • 10
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • A. Sahai, H. Seyalioglu, and B. Waters, "Dynamic credentials and ciphertext delegation for attribute-based encryption, " in Proc. Int. Cryptol. Conf., 2012, pp. 199-217.
    • (2012) Proc. Int. Cryptol. Conf , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 11
    • 0001917195 scopus 로고
    • Generalized secret sharing and monotone functions
    • J. C. Benaloh and J. Leichter, "Generalized secret sharing and monotone functions, " in Proc. Adv. Cryptol., 1988, pp. 27-35.
    • (1988) Proc. Adv. Cryptol , pp. 27-35
    • Benaloh, J.C.1    Leichter, J.2
  • 14
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols, " in Proc. 1st ACM Conf. Comput. Commun. Security, 1993, pp. 62-73.
    • (1993) Proc. 1st ACM Conf. Comput. Commun. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 15
    • 84866926275 scopus 로고    scopus 로고
    • Attributed-based access control for multiauthority systems in cloud storage
    • K. Yang and X. Jia, "Attributed-based access control for multiauthority systems in cloud storage, " in Proc. IEEE 32nd Int. Conf. Distrib. Comput. Syst., 2012, pp. 1-10.
    • (2012) Proc IEEE 32nd Int. Conf. Distrib. Comput. Syst , pp. 1-10
    • Yang, K.1    Jia, X.2
  • 16
    • 84883112893 scopus 로고    scopus 로고
    • Privacy preserving cloud data access with multi-Authorities
    • T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-Authorities, " in Proc. Conf. Inform. Commun., 2013, pp. 2625-2633.
    • (2013) Proc. Conf. Inform. Commun , pp. 2625-2633
    • Jung, T.1    Li, X.-Y.2    Wan, Z.3    Wan, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.