2016 13th IEEE Annual Consumer Communications &Amp; Networking Conference (CCNC) 2016
DOI: 10.1109/ccnc.2016.7444868
|View full text |Cite
|
Sign up to set email alerts
|

K-anonymous location-based fine-grained access control for mobile cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…The comprehension of privacy policies L. M. Zhou et al, 2018 has also evolved into a research focal point, aiming to advance user-friendly privacy con gurations. Furthermore, cryptography, security protocols, and certi cate management are deemed crucial for data transfer and storage, while security concerns pertaining to malware, exploits, and mobile operating systems also warrant attention Baseri et al, 2016 . Research is also delving into blockchain and decentralized technologies to bolster security and data transparency. In summary, this study delineates primary research themes within the sphere of data security and privacy protection, observing signi cant growth and attention in this eld in recent years.…”
Section: Discussionmentioning
confidence: 99%
“…The comprehension of privacy policies L. M. Zhou et al, 2018 has also evolved into a research focal point, aiming to advance user-friendly privacy con gurations. Furthermore, cryptography, security protocols, and certi cate management are deemed crucial for data transfer and storage, while security concerns pertaining to malware, exploits, and mobile operating systems also warrant attention Baseri et al, 2016 . Research is also delving into blockchain and decentralized technologies to bolster security and data transparency. In summary, this study delineates primary research themes within the sphere of data security and privacy protection, observing signi cant growth and attention in this eld in recent years.…”
Section: Discussionmentioning
confidence: 99%
“…They emphasize on the usage of decentralized authority for limiting the identity leakage and extends to generalize the file access control by privilege control on the cloud data by using fine tune granular access to the data stored on the cloud. Jia-Lun Tsai et.al [5] addressed the privacy resilient data concerns in the Smart card generators (SCG) they proposed the scheme to reduce the usage of higher memory and bounded the secure key generators for distribution of keys in cloud environment and restricted the interaction of cloud service provider to the Scg. Yaser Baseri et.al [6] investigated the Location based service for attribute based control for the dynamic mobile cloud environment.…”
Section: Related Workmentioning
confidence: 99%
“…One of the most important problems is that it does not create problems in the systems that work on their own.Additionally, FGAC has problems in identifying and distinguishing between the operations produced when cooperating with complex structures. Another important problem is that when the operations should be updated according to the changing environment needs, identifying the policies in a semantic manner and formalizing them, applying the policies in a secure manner, and analyzing the policies in a coherent manner becomes much harder [85][86][87][88]. Review: As the operations are performed in user-based fashion, FGAC has a low level of Privileges/Capabilities Discover.…”
Section: Fine Grained Access Controlmentioning
confidence: 99%
“…It is used for Attribute Based Encryption (ABE) processes and allows the user to perform encryptingdecrypting processes. It also performs the operations on the data via a private key and a cipher text [87,[95][96][97][98]. It is separated into two categories as KP-ABE and CP-ABE [21,[99][100][101][102].…”
Section: Attribute Based Encryption Fine Grained Access Controlmentioning
confidence: 99%