2021
DOI: 10.1080/24751839.2021.1941574
|View full text |Cite
|
Sign up to set email alerts
|

Sharing secured data on peer-to-peer applications using attribute-based encryption

Abstract: The strong growth of communication and storage gives rise to the significantly increasing demand for collecting, storing, and sharing a large amount of data on networks. This is further enhanced by the data-driven market, where everyone wants to access other parties' data. Data is the bedrock of today's technologies and researchers, especially in machine learning and deep learning. The business value of organizations is also massively data-dependent. Recent studies and industry applications can apply analytic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…Based on the symmetric key, the content can be encrypted and decrypted by the group members. Dang et al [46] proposed an encryption methodology for online applications to offer a fusion of attribute-based encryption (AB) with P2P-based programs.…”
Section: C) Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the symmetric key, the content can be encrypted and decrypted by the group members. Dang et al [46] proposed an encryption methodology for online applications to offer a fusion of attribute-based encryption (AB) with P2P-based programs.…”
Section: C) Encryptionmentioning
confidence: 99%
“…A group's data cannot be useful to others. Attribute-based encryption [46] Based on the target user's attribute data, the data is decrypted. It is a practical solution for OSN, but heavy computation is required for this type of model.…”
Section: Encryptionmentioning
confidence: 99%
“…These user attributes and policies are engaged as a public key, but the data is decrypted by a private key. Attributed-based encryption [254] was first introduced by Sahai and Waters to solve data security issues. There are two types of attribute-based encryption based on key policy and ciphertext policy.…”
Section: Proof Of History (Poh)-thementioning
confidence: 99%
“…In this dynamic of innovation and continuous improvement, new approaches are emerging to address the emerging challenges of P2P networks. Concepts such as animal behavior-based routing, the use of artificial intelligence for query optimization, and securing P2P communications through advanced encryption techniques are garnering increasing interest in the research community (Dang et al, 2021;Šešum-Čavić et al, 2016;Shoab & Alotaibi, 2022).…”
Section: Related Workmentioning
confidence: 99%