메뉴 건너뛰기




Volumn 4, Issue 2, 2017, Pages 563-571

An Efficient and Fine-Grained Big Data Access Control Scheme with Privacy-Preserving Policy

Author keywords

Access control; attribute bloom filter (ABF); big data; linear secret sharing scheme (LSSS) access structure; privacy preserving policy

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; DATA PRIVACY; DATA STRUCTURES; INFORMATION THEORY; SECURITY OF DATA;

EID: 85019012502     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2016.2571718     Document Type: Article
Times cited : (148)

References (25)
  • 1
    • 77954051808 scopus 로고    scopus 로고
    • Recommendations Nat. Inst. Standards Technol., NIST, Washington, DC, USA, Tech. Rep. 800-145
    • P. Mell and T. Grance, "The NIST definition of cloud computing, " Recommendations Nat. Inst. Standards Technol., NIST, Washington, DC, USA, Tech. Rep. 800-145, 2011.
    • (2011) The NIST Definition of Cloud Computing
    • Mell, P.1    Grance, T.2
  • 2
    • 84905024335 scopus 로고    scopus 로고
    • Toward efficient and privacy-preserving computing in big data era
    • Jul./Aug.
    • R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, "Toward efficient and privacy-preserving computing in big data era, " IEEE Netw., vol. 28, no. 4, pp. 46-50, Jul./Aug. 2014.
    • (2014) IEEE Netw. , vol.28 , Issue.4 , pp. 46-50
    • Lu, R.1    Zhu, H.2    Liu, X.3    Liu, J.K.4    Shao, J.5
  • 3
    • 84903121888 scopus 로고    scopus 로고
    • Expressive, efficient, and revocable data access control for multi-Authority cloud storage
    • Jul.
    • K. Yang and X. Jia, "Expressive, efficient, and revocable data access control for multi-Authority cloud storage, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735-1744, Jul. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.7 , pp. 1735-1744
    • Yang, K.1    Jia, X.2
  • 4
    • 84928685729 scopus 로고    scopus 로고
    • Enabling fine-grained access control with efficient attribute revocation and policy updating in smart grid
    • H. Li, D. Liu, K. Alharbi, S. Zhang, and X. Lin, "Enabling fine-grained access control with efficient attribute revocation and policy updating in smart grid, " KSII Trans. Internet Inf. Syst., vol. 9, no. 4, pp. 1404-1423, 2015.
    • (2015) KSII Trans. Internet Inf. Syst. , vol.9 , Issue.4 , pp. 1404-1423
    • Li, H.1    Liu, D.2    Alharbi, K.3    Zhang, S.4    Lin, X.5
  • 5
    • 84968761568 scopus 로고    scopus 로고
    • Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach
    • May
    • K. Yang, Z. Liu, X. Jia, and X. S. Shen, "Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach, " IEEE Trans. Multimedia, vol. 18, no. 5, pp. 940-950, May 2016.
    • (2016) IEEE Trans. Multimedia , vol.18 , Issue.5 , pp. 940-950
    • Yang, K.1    Liu, Z.2    Jia, X.3    Shen, X.S.4
  • 6
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, " in Proc. PKC, Taormina, Italy, 2011, pp. 53-70.
    • (2011) Proc. PKC, Taormina, Italy , pp. 53-70
    • Waters, B.1
  • 7
    • 58749115565 scopus 로고    scopus 로고
    • Secure threshold multi authority attribute based encryption without a central authority
    • H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority, " in Proc. INDOCRYPT, Kharagpur, India, 2008, pp. 426-436.
    • (2008) Proc. INDOCRYPT, Kharagpur, India , pp. 426-436
    • Lin, H.1    Cao, Z.2    Liang, X.3    Shao, J.4
  • 8
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden encryptor-specified access structures
    • Heidelberg, Germany: Springer
    • T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures, " in Applied Cryptography and Network Security. Heidelberg, Germany: Springer, 2008, pp. 111-129.
    • (2008) Applied Cryptography and Network Security , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 9
    • 70350407157 scopus 로고    scopus 로고
    • Privacy-Aware attribute-based encryption with user accountability
    • J. Li, K. Ren, B. Zhu, and Z. Wan, "Privacy-Aware attribute-based encryption with user accountability, " in Proc. Inf. Security, Pisa, Italy, 2009, pp. 347-362.
    • (2009) Proc. Inf. Security, Pisa, Italy , pp. 347-362
    • Li, J.1    Ren, K.2    Zhu, B.3    Wan, Z.4
  • 10
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Heidelberg, Germany: Springer
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data, " in Theory of Cryptography. Heidelberg, Germany: Springer, 2007, pp. 535-554.
    • (2007) Theory of Cryptography , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 11
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Heidelberg, Germany: Springer
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products, " in Advances in Cryptology-EUROCRYPT 2008. Heidelberg, Germany: Springer, 2008, pp. 146-162.
    • (2008) Advances in Cryptology-EUROCRYPT 2008 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 12
    • 79956295416 scopus 로고    scopus 로고
    • Fully secure cipertext-policy hiding CPABE
    • Heidelberg, Germany: Springer
    • J. Lai, R. H. Deng, and Y. Li, "Fully secure cipertext-policy hiding CPABE, " in Information Security Practice and Experience. Heidelberg, Germany: Springer, 2011, pp. 24-39.
    • (2011) Information Security Practice and Experience , pp. 24-39
    • Lai, J.1    Deng, R.H.2    Li, Y.3
  • 13
    • 84897766928 scopus 로고    scopus 로고
    • Challenges on wireless heterogeneous networks for mobile cloud computing
    • Jun.
    • L. Lei, Z. Zhong, K. Zheng, J. Chen, and H. Meng, "Challenges on wireless heterogeneous networks for mobile cloud computing, " IEEE Wireless Commun., vol. 20, no. 3, pp. 34-44, Jun. 2013.
    • (2013) IEEE Wireless Commun. , vol.20 , Issue.3 , pp. 34-44
    • Lei, L.1    Zhong, Z.2    Zheng, K.3    Chen, J.4    Meng, H.5
  • 14
    • 84961990862 scopus 로고    scopus 로고
    • Big data-driven optimization for mobile networks toward 5G
    • Jan./Feb.
    • K. Zheng, et al., "Big data-driven optimization for mobile networks toward 5G, " IEEE Netw., vol. 30, no. 1, pp. 44-51, Jan./Feb. 2016.
    • (2016) IEEE Netw. , vol.30 , Issue.1 , pp. 44-51
    • Zheng, K.1
  • 15
    • 84962028249 scopus 로고    scopus 로고
    • Big data in mobile social networks: A QoE-oriented framework
    • Jan./Feb.
    • Z. Su, Q. Xu, and Q. Qi, "Big data in mobile social networks: A QoE-oriented framework, " IEEE Netw., vol. 30, no. 1, pp. 52-57, Jan./Feb. 2016.
    • (2016) IEEE Netw. , vol.30 , Issue.1 , pp. 52-57
    • Su, Z.1    Xu, Q.2    Qi, Q.3
  • 16
    • 84940510005 scopus 로고    scopus 로고
    • Engineering searchable encryption of mobile cloud networks: When QoE meets QoP
    • Aug.
    • H. Li, D. Liu, Y. Dai, and T. H. Luan, "Engineering searchable encryption of mobile cloud networks: When QoE meets QoP, " IEEE Wireless Commun., vol. 22, no. 4, pp. 74-80, Aug. 2015.
    • (2015) IEEE Wireless Commun. , vol.22 , Issue.4 , pp. 74-80
    • Li, H.1    Liu, D.2    Dai, Y.3    Luan, T.H.4
  • 17
    • 84973579525 scopus 로고    scopus 로고
    • Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
    • May/Jun.
    • H. Li, et al., "Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data, " IEEE Trans. Depend. Secure Comput., vol. 13, no. 3, pp. 312-325, May/Jun. 2016, doi: 10.1109/TDSC.2015.2406704.
    • (2016) IEEE Trans. Depend. Secure Comput. , vol.13 , Issue.3 , pp. 312-325
    • Li, H.1
  • 18
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-based access control with hidden policies and hidden credentials
    • Oct.
    • K. Frikken, M. Atallah, and J. Li, "Attribute-based access control with hidden policies and hidden credentials, " IEEE Trans. Comput., vol. 55, no. 10, pp. 1259-1270, Oct. 2006.
    • (2006) IEEE Trans. Comput. , vol.55 , Issue.10 , pp. 1259-1270
    • Frikken, K.1    Atallah, M.2    Li, J.3
  • 20
    • 84871975909 scopus 로고    scopus 로고
    • Expressive CP-ABE with partially hidden access structures
    • J. Lai, R. H. Deng, and Y. Li, "Expressive CP-ABE with partially hidden access structures, " in Proc. ASIACCS, Seoul, South Korea, 2012, pp. 18-19.
    • (2012) Proc. ASIACCS, Seoul, South Korea , pp. 18-19
    • Lai, J.1    Deng, R.H.2    Li, Y.3
  • 21
    • 84885145341 scopus 로고    scopus 로고
    • Attribute-based secure data sharing with hidden policies in smart grid
    • Nov.
    • J. Hur, "Attribute-based secure data sharing with hidden policies in smart grid, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 11, pp. 2171-2180, Nov. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.11 , pp. 2171-2180
    • Hur, J.1
  • 23
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors, " Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 24
    • 84961742903 scopus 로고    scopus 로고
    • Secure and verifiable policy update outsourcing for big data access control in the cloud
    • Dec.
    • K. Yang, X. Jia, and K. Ren, "Secure and verifiable policy update outsourcing for big data access control in the cloud, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 12, pp. 3461-3470, Dec. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.12 , pp. 3461-3470
    • Yang, K.1    Jia, X.2    Ren, K.3
  • 25
    • 84888990465 scopus 로고    scopus 로고
    • When private set intersection meets big data: An efficient and scalable protocol
    • C. Dong, L. Chen, and Z. Wen, "When private set intersection meets big data: An efficient and scalable protocol, " in Proc. CCS, Berlin, Germany, 2013, pp. 789-800.
    • (2013) Proc. CCS, Berlin, Germany , pp. 789-800
    • Dong, C.1    Chen, L.2    Wen, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.