2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications 2011
DOI: 10.1109/trustcom.2011.14
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserved Access Control for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…cryptography technology) we will find that this technique differs from Anonymity-based because Anonymity-based method gets rid of key management and thus it stands simple and flexible. But Anonymity-based method is easier, the attributes that has to be made anonymous varies and it depends on the cloud service provider [23] [24].…”
Section: A Privacy Challenges Solutionsmentioning
confidence: 99%
“…cryptography technology) we will find that this technique differs from Anonymity-based because Anonymity-based method gets rid of key management and thus it stands simple and flexible. But Anonymity-based method is easier, the attributes that has to be made anonymous varies and it depends on the cloud service provider [23] [24].…”
Section: A Privacy Challenges Solutionsmentioning
confidence: 99%
“…ABE has such advantages as scalability and high flexibility in terms of attributes based access policies and fine-grained access control. It has been widely applied to secure cloud data storage in recent years [10][11][12][13][14][15][16][17]. However, all above existing solutions about access control on encrypted data did not consider how to solve the issue of duplicated data storage in cloud computing in a holistic and comprehensive manner, especially for encrypted data in various data storage scenarios.…”
Section: Access Control On Encrypted Datamentioning
confidence: 99%
“…How to make cloud data access control adapt to various scenarios and satisfy different user demands becomes a practically important issue. Access control on encrypted data has been widely studied in the literature [10][11][12][13][14][15][16][17]33]. However, few of them can flexibly support various requirements on cloud data protection in a uniform way, especially with economic deduplication management.…”
Section: Introductionmentioning
confidence: 99%
“…The SRM dynamically re-encrypts the encrypted data in the cloud. So because of re-encryption the privacy of users data is maintain and providing full accesscontrol to the owner of the data without disclosing data to cloud providerdue to data outsourcing and untrusted cloud server becomes challenging issue in cloud storage system [25].…”
Section: Privacy-preserved Access Controlmentioning
confidence: 99%