2014
DOI: 10.1007/978-3-319-11203-9_21
|View full text |Cite
|
Sign up to set email alerts
|

Who Is Touching My Cloud

Abstract: Abstract. Advanced access controls have been proposed to secure sensitive data maintained by a third party. A subtle issue in such systems is that some access credentials may be leaked due to various reasons, which could severely damage data security. In this paper, we investigate leakage tracing enabled access control over outsourced data, so that one can revoke the suspected leaked credentials or prepare judicial evidences for legal procedure if necessary. Specifically, we propose a leaked access credential … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
5
3
2

Relationship

4
6

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Very recently, Liu et al [28] refined this technique with chameleon hash to convert a CPA-secure attribute-based encryption (ABE) scheme into a CCA2-secure ABE scheme. Deng et al [15,16] shows how to trace compromised secret keys in IBE and ABE systems.…”
Section: Identity-based Encryptionmentioning
confidence: 99%
“…Very recently, Liu et al [28] refined this technique with chameleon hash to convert a CPA-secure attribute-based encryption (ABE) scheme into a CCA2-secure ABE scheme. Deng et al [15,16] shows how to trace compromised secret keys in IBE and ABE systems.…”
Section: Identity-based Encryptionmentioning
confidence: 99%
“…Liu et al [28] enhanced chosen-plaintext secure ABE with adaptively chosen ciphertext security at a marginal cost. The leakage tracing mechanism was further realized in cloud storage with ABE for fine-grained access control [13].…”
Section: Related Workmentioning
confidence: 99%
“…However, this remote storage paradigm also brings security concerns about integrity and privacy over the outsourced files [25,7]. To address the integrity concern, a number of cryptographic concepts have been introduced, for example, Proofs of Storage [3], Provable Data Possession (PDP) [1] and Proofs of Retrievability (PoR) [11].…”
Section: Introductionmentioning
confidence: 99%