2014
DOI: 10.1002/cpe.3395
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient data‐sharing in clouds

Abstract: SummaryWith the rapid development of cloud computing, cloud storage has become a cost‐effective solution for many users with the demand of data storage. However, there are still two main concerns for users with sensitive/private data: (1) Is it secure to store private data in public cloud storages? (2) Is there an efficient way to share private data with other specified users? In the past years, several papers in the literature have used proxy re‐encryption (PRE) to address these two concerns, where the effici… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 48 publications
0
16
0
Order By: Relevance
“…Thus, to provide fine‐grained access control with self‐reliant authorization to outsourced encrypted data, various types of encryption schemes are utilized. Examples of these cryptographically enforced user‐based access control schemes include those based on proxy reencryption and ABE …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, to provide fine‐grained access control with self‐reliant authorization to outsourced encrypted data, various types of encryption schemes are utilized. Examples of these cryptographically enforced user‐based access control schemes include those based on proxy reencryption and ABE …”
Section: Related Workmentioning
confidence: 99%
“…Thus, to provide fine-grained access control with self-reliant authorization to outsourced encrypted data, various types of encryption schemes are utilized. Examples of these cryptographically enforced user-based access control schemes [12][13][14][15] include those based on proxy reencryption 4,5,16,17 and ABE. 2,3,18,19 Regarding cryptographically enforced user-based access control schemes, Kamara and Lauter 12 developed a user-based access control for cloud storage using symmetric-based cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, cloud computing has emerged as a promising paradigm that substantiates the vision of computing, storage, and networking resources (Beloglazov and Buyya, 2013;Zhang and Zhang, 2015). In cloud platforms, users' applications are deployed over the shared virtual resources which offer their capabilities as various services.…”
Section: Introductionmentioning
confidence: 99%
“…In the 10th paper , the authors design a secure and practical proxy re‐encryption scheme, which is Chosen Ciphertext Attacks (CCA) secure under the computational Diffie–Hellman assumption in the random oracle model. They evaluate the efficiency of the proposed scheme both in theoretical comparisons with related schemes and in implementations at several security levels.…”
mentioning
confidence: 99%