2015
DOI: 10.1109/tifs.2015.2419186
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage

Abstract: The need of secure big data storage service is more desirable than ever to date. The basic requirement of the service is to guarantee the confidentiality of the data. However, the anonymity of the service clients, one of the most essential aspects of privacy, should be considered simultaneously. Moreover, the service also should provide practical and fine-grained encrypted data sharing such that a data owner is allowed to share a ciphertext of data among others under some specified conditions. This paper, for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 81 publications
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…This is an important attack because the targeted profile once existed on a social network. A game based model which is also called collusion attack model in proposed in [49]. In this model, the attacker attempts to acquire all encryption keys of data and wins if a valid secret key is acquired.…”
Section: Different Types Of Privacy Attacksmentioning
confidence: 99%
“…This is an important attack because the targeted profile once existed on a social network. A game based model which is also called collusion attack model in proposed in [49]. In this model, the attacker attempts to acquire all encryption keys of data and wins if a valid secret key is acquired.…”
Section: Different Types Of Privacy Attacksmentioning
confidence: 99%
“…The mechanisms have been investigated in this work were, Hadoop security, monitoring, auditing, anonymization, cloud security and key management. Liang, et al [23] introduced a cipher text multi-sharing protocol for guaranteeing the confidentiality of the Big data. This mechanism integrated the benefits of proxy re-encryption and anonymous techniques for secure big data storage service.…”
Section: Literature Reviewmentioning
confidence: 99%