2023
DOI: 10.1186/s13677-023-00444-4
|View full text |Cite
|
Sign up to set email alerts
|

Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

Abstract: With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal. However, most of the existing solutions have high computational and trust costs. Furthermore, the fairness of access authorization and the security of data search can be difficult to guarantee. To address these issues, we propose a novel access control scheme based on blockchain and a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…Finally, the contradiction between the resource-constrained end devices and the computational complexity of CP-ABE. CP-ABE requires substantial computational resources with the computational effort increasing linearly with the complexity of the attribute set or access policy [ 13 ]. This poses a challenge for resource-constrained end devices, especially in edge computing environments, where these devices have limited computational power, storage space, and battery life, making them unable to handle the extreme computational complexity of CP-ABE.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the contradiction between the resource-constrained end devices and the computational complexity of CP-ABE. CP-ABE requires substantial computational resources with the computational effort increasing linearly with the complexity of the attribute set or access policy [ 13 ]. This poses a challenge for resource-constrained end devices, especially in edge computing environments, where these devices have limited computational power, storage space, and battery life, making them unable to handle the extreme computational complexity of CP-ABE.…”
Section: Introductionmentioning
confidence: 99%