2017
DOI: 10.1016/j.jnca.2016.11.016
|View full text |Cite
|
Sign up to set email alerts
|

CloudFile: A cloud data access control system based on mobile social trust

Abstract: Personal data management at cloud with mobile devices confronts a number of practical challenges such as security, efficiency and usability. Many existing solutions suffer from high computation and communication costs, thus impractical to be deployed in mobile domains. Notably, high popularity of mobile social networking provides a good platform to assess social trust in a pervasive way, which can be applied to automatically manage personal data access at the cloud with sound performance and effectiveness. Thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…Besides, they applied reputation as a metric to decide whether an entity is eligible to access data. ABE is adopted to support data access control at the data owner side in [107]. The data owner determines the eligibility of a data user by evaluating its social trust in [107].…”
Section: Security and Privacy In Cloud Computingmentioning
confidence: 99%
See 2 more Smart Citations
“…Besides, they applied reputation as a metric to decide whether an entity is eligible to access data. ABE is adopted to support data access control at the data owner side in [107]. The data owner determines the eligibility of a data user by evaluating its social trust in [107].…”
Section: Security and Privacy In Cloud Computingmentioning
confidence: 99%
“…Therefore, the involvement of reputation can motivate cooperative behavior. To achieve this in practice, we can involve reputation-based access control schemes with different policies [105,107] into deduplication schemes. Although social recommendation considers human factors and can be employed to study competition between CSPs, this topic lies outside the scope of this dissertation.…”
Section: Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some schemes used the updated version number to generate the updated key by the attribute authority to revoke attributes [35][36][37]. In the scheme [38][39][40], the cloud is used to perform the revocation process. Yan et al [38] revoked attributes through the cooperation between the data owner and the cloud, but the data owner needs to generate new keys for the non-revoked users, which cost them a lot of computing time.…”
Section: ) Attribute Revocationmentioning
confidence: 99%
“…In the scheme [38][39][40], the cloud is used to perform the revocation process. Yan et al [38] revoked attributes through the cooperation between the data owner and the cloud, but the data owner needs to generate new keys for the non-revoked users, which cost them a lot of computing time. Wang et al [39] used the cloud to re-encrypt the ciphertext according to the revocation list and respond to the queries of the nonrevoked users.…”
Section: ) Attribute Revocationmentioning
confidence: 99%