2016
DOI: 10.1109/cc.2016.7559080
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-based access control scheme with efficient revocation in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…Moreover, the scheme support policy update when patient wants to change the access policy associated with ciphertext, but simple access structures can be implemented. Xia et al [14] proposed attribute-based access control scheme with efficient revocation in cloud computing. It could support an efficient user revocation mechanism, but it can't protect the user's attribute privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the scheme support policy update when patient wants to change the access policy associated with ciphertext, but simple access structures can be implemented. Xia et al [14] proposed attribute-based access control scheme with efficient revocation in cloud computing. It could support an efficient user revocation mechanism, but it can't protect the user's attribute privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, the authors introduced an efficient revocation scheme to supports both backward and forward security. In Xue et al [16] explored an approach of cloud side access control mechanism for encrypted data storage. From the proposed scheme can secure the cloud storage from the external attacks and offers power consumption accountability.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the method is infeasible. Zhihua Xia[ 28 ] presented an attribute-based access control project with valid revocation in cloud computing. The revocation is implemented using the version number of the private key, and the scheme also supports the backward security and forward security.…”
Section: Introductionmentioning
confidence: 99%