메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 720-729

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

Author keywords

Attribute based encryption; Ciphertext policy; Fog computing; Key delegation abuse

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; FOG; SECURITY OF DATA;

EID: 85011878988     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.01.026     Document Type: Article
Times cited : (103)

References (49)
  • 6
    • 85029659638 scopus 로고    scopus 로고
    • Data Exfiltration from Internet of Things Devices: iOS Devices as Case Studies.
    • C.J. DOrazio, K.-K.R. Choo, L.T. Yang, Data Exfiltration from Internet of Things Devices: iOS Devices as Case Studies.
    • DOrazio, C.J.1    Choo, K.-K.R.2    Yang, L.T.3
  • 7
    • 84995549442 scopus 로고    scopus 로고
    • Remote wiping and secure deletion on mobile devices: a review
    • Leom, M.D., Choo, K.-K.R., Hunt, R., Remote wiping and secure deletion on mobile devices: a review. J. Forensic Sci. 61:6 (2016), 1473–1492.
    • (2016) J. Forensic Sci. , vol.61 , Issue.6 , pp. 1473-1492
    • Leom, M.D.1    Choo, K.-K.R.2    Hunt, R.3
  • 8
    • 84942465510 scopus 로고    scopus 로고
    • A cloud-focused mobile forensics methodology
    • Do, Q., Martini, B., Choo, K.-K.R., A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2:4 (2015), 60–65.
    • (2015) IEEE Cloud Comput. , vol.2 , Issue.4 , pp. 60-65
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 9
    • 84920152770 scopus 로고    scopus 로고
    • Distributed filesystem forensics: XtreemFS as a case study
    • Martini, B., Choo, K.-K.R., Distributed filesystem forensics: XtreemFS as a case study. Digit. Investig. 11:4 (2014), 295–313.
    • (2014) Digit. Investig. , vol.11 , Issue.4 , pp. 295-313
    • Martini, B.1    Choo, K.-K.R.2
  • 11
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: ownCloud as a case study
    • Martini, B., Choo, K.-K.R., Cloud storage forensics: ownCloud as a case study. Digit. Investig. 10:4 (2013), 287–299.
    • (2013) Digit. Investig. , vol.10 , Issue.4 , pp. 287-299
    • Martini, B.1    Choo, K.-K.R.2
  • 12
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini, B., Choo, K.-K.R., An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9:2 (2012), 71–80.
    • (2012) Digit. Investig. , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 13
    • 84916888408 scopus 로고    scopus 로고
    • Impacts of increasing volume of digital forensic data: A survey and future research challenges
    • Quick, D., Choo, K.-K.R., Impacts of increasing volume of digital forensic data: A survey and future research challenges. Digit. Investig. 11:4 (2014), 273–294.
    • (2014) Digit. Investig. , vol.11 , Issue.4 , pp. 273-294
    • Quick, D.1    Choo, K.-K.R.2
  • 14
    • 84896319180 scopus 로고    scopus 로고
    • Google drive: forensic analysis of data remnants
    • Quick, D., Choo, K.-K.R., Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 40 (2014), 179–193.
    • (2014) J. Netw. Comput. Appl. , vol.40 , pp. 179-193
    • Quick, D.1    Choo, K.-K.R.2
  • 15
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick, D., Choo, K.-K.R., Dropbox analysis: Data remnants on user machines. Digit. Investig. 10:1 (2013), 3–18.
    • (2013) Digit. Investig. , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 16
    • 84884589497 scopus 로고    scopus 로고
    • Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    • Quick, D., Choo, K.-K.R., Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?. Digit. Investig. 10:3 (2013), 266–277.
    • (2013) Digit. Investig. , vol.10 , Issue.3 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 17
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick, D., Choo, K.-K., Raymond, Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener. Comput. Syst. 29:6 (2013), 1378–1394.
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.2    Raymond3
  • 24
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden encryptor-specified access structures
    • S. Bellovin R. Gennaro A. Keromytis M. Yung Springer Berlin, Heidelberg
    • Nishide, T., Yoneyama, K., Ohta, K., Attribute-based encryption with partially hidden encryptor-specified access structures. Bellovin, S., Gennaro, R., Keromytis, A., Yung, M., (eds.) Applied Cryptography and Network Security Lecture Notes in Computer Science, vol. 5037, 2008, Springer Berlin, Heidelberg 978-3-540-68913-3, 111–129, 10.1007/978-3-540-68914-0_7.
    • (2008) Applied Cryptography and Network Security, Lecture Notes in Computer Science , vol.5037 , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 25
    • 85029641603 scopus 로고    scopus 로고
    • Black Box Accountable Authority Identity-Based Encryption
    • V. Goyal, A. Sahai, S. Lu, B. Waters, Black Box Accountable Authority Identity-Based Encryption, 2008.
    • (2008)
    • Goyal, V.1    Sahai, A.2    Lu, S.3    Waters, B.4
  • 31
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • G. Blakley D. Chaum Springer Berlin, Heidelberg
    • Shamir, A., Identity-based cryptosystems and signature schemes. Blakley, G., Chaum, D., (eds.) Advances in Cryptology Lecture Notes in Computer Science, vol. 196, 1985, Springer Berlin, Heidelberg 978-3-540-15658-1, 47–53, 10.1007/3-540-39568-7_5.
    • (1985) Advances in Cryptology, Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 32
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai, B. Waters, Fuzzy identity-based encryption, in: EUROCRYPT, 2004, pp. 457–473.
    • (2004) EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 33
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, A. Sahai, O. Pandey, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: Proc. of ACMCCS06 2006, pp. 89–98.
    • Proc. of ACMCCS06 2006 , pp. 89-98
    • Goyal, V.1    Sahai, A.2    Pandey, O.3    Waters, B.4
  • 34
    • 85029659604 scopus 로고    scopus 로고
    • Attribute-Based Encryption with Non-Monotonic Access Structures, 2007. Cryptology ePrint Archive, Report /323
    • R. Ostrovsky, A. Sahai, B. Waters, Attribute-Based Encryption with Non-Monotonic Access Structures, 2007. Cryptology ePrint Archive, Report 2007/323, http://eprint.iacr.org/.
    • (2007)
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 35
    • 85029651790 scopus 로고    scopus 로고
    • Ciphertext-Policy Attribute-Based Encryption, Security and Privacy, 2007. SP’07. IEEE Symposium on
    • B.W. John Bethencourt, Amit Sahai, Ciphertext-Policy Attribute-Based Encryption, Security and Privacy, 2007. SP’07. IEEE Symposium on, 2007, pp. 321–334.
    • (2007) , pp. 321-334
    • John Bethencourt, B.W.1    Sahai, A.2
  • 36
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • M.M. Halldorsson A. INgolfsdottir I. Walukiewicz Springer Heidelberg
    • Goyal, V., Jain, A., Pandey, O., Sahai, A., Bounded ciphertext policy attribute based encryption. Halldorsson, M.M., INgolfsdottir, A., Walukiewicz, I., (eds.) ICALP 2008, Part II LNCS, vol. 5126, 2008, Springer, Heidelberg, 579–591.
    • (2008) ICALP 2008, Part II, LNCS , vol.5126 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 39
    • 84878513129 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Jonathan Katz, B.W., Sahai, Amit, Predicate encryption supporting disjunctions, polynomial equations, and inner products. J. Cryptol. 26:2 (2013), 191–224.
    • (2013) J. Cryptol. , vol.26 , Issue.2 , pp. 191-224
    • Jonathan Katz, B.W.1    Sahai, A.2
  • 40
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • S. Vadhan Springer Berlin, Heidelberg
    • Boneh, D., Waters, B., Conjunctive, subset, and range queries on encrypted data. Vadhan, S., (eds.) Theory of Cryptography Lecture Notes in Computer Science, vol. 4392, 2007, Springer Berlin, Heidelberg 978-3-540-70935-0, 535–554, 10.1007/978-3-540-70936-7_29.
    • (2007) Theory of Cryptography, Lecture Notes in Computer Science , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 41
    • 77952383290 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden ciphertext policies
    • Nishide, T., Yoneyama, K., OHTA, K., Attribute-based encryption with partially hidden ciphertext policies. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 09168508, 92(1), 2009, 22–32, 10.1587/transfun.E92.A.22.
    • (2009) IEICE Trans. Fundam. Electron. Commun. Comput. Sci. , vol.92 , Issue.1 , pp. 22-32
    • Nishide, T.1    Yoneyama, K.2    OHTA, K.3
  • 42
    • 85029616080 scopus 로고    scopus 로고
    • Attribute-Based Encryption with Key Cloning Protection, Cryptology ePrint Archive, Report 2008/478
    • M.J. Hinek, S. Jiang, R. Safavi-Naini, S.F. Shahandashti, Attribute-Based Encryption with Key Cloning Protection, Cryptology ePrint Archive, Report 2008/478, 2008. http://eprint.iacr.org/.
    • (2008)
    • Hinek, M.J.1    Jiang, S.2    Safavi-Naini, R.3    Shahandashti, S.F.4
  • 43
    • 85029610566 scopus 로고    scopus 로고
    • A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control., IACR Cryptology ePrint Archive.
    • K.K. Jin Li, Kui Ren, A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control., IACR Cryptology ePrint Archive.
    • Jin Li, K.K.1    Ren, K.2
  • 45
    • 84872101907 scopus 로고    scopus 로고
    • White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
    • Liu, Z., Cao, Z., Wong, D.S., White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. Nformaon Forn Ry Ranaon on 8:1 (2013), 76–88.
    • (2013) Nformaon Forn Ry Ranaon on , vol.8 , Issue.1 , pp. 76-88
    • Liu, Z.1    Cao, Z.2    Wong, D.S.3
  • 46
    • 84889056927 scopus 로고    scopus 로고
    • Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay, IACR Cryptology ePrint Archive
    • Z. Liu, Z. Cao, D.S. Wong, Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay, IACR Cryptology ePrint Archive, 2013, pp. 475–486.
    • (2013) , pp. 475-486
    • Liu, Z.1    Cao, Z.2    Wong, D.S.3
  • 47
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: attribute-based encryption and (Hierarchical) inner product encryption
    • H. Gilbert Springer Berlin, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B., Fully secure functional encryption: attribute-based encryption and (Hierarchical) inner product encryption. Gilbert, H., (eds.) Advances in Cryptology EUROCRYPT 2010 Lecture Notes in Computer Science, vol. 6110, 2010, Springer Berlin, Heidelberg 978-3-642-13189-9, 62–91, 10.1007/978-3-642-13190-5_4.
    • (2010) Advances in Cryptology EUROCRYPT 2010, Lecture Notes in Computer Science , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 48
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Springer
    • Boneh, D., Franklin, M., Identity-based encryption from the Weil pairing. Advances in CryptologyCRYPTO 2001, 2001, Springer, 213–229.
    • (2001) Advances in CryptologyCRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 49
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Springer
    • Waters, B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. International Workshop on Public Key Cryptography, 2011, Springer, 53–70.
    • (2011) International Workshop on Public Key Cryptography , pp. 53-70
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.