Have a personal or library account? Click to login
An Efficient Access Control Scheme for Cloud Environment Cover

An Efficient Access Control Scheme for Cloud Environment

Open Access
|Sep 2013

References

  1. 1. Tu, S., S. Niu, H. Li. A Fine-Grained Access Control and Revocation Scheme on Clouds. Concurrency Comput. Pract. Exper, 2012, ISSN: 15320626, DOI: 10.1002/cpe.2956.10.1002/cpe.2956
  2. 2. Shamir. Identity-Based Eryptosystem and Signature Schemes. - In: Proc. of CRYPTO’84 Conf., 1984, ISBN: 978-3-540-15658-1, 47-53.
  3. 3. Boneh, D., M. Franklin. Identity-Based Encryption from the Weil Pairing. - In: Proc. of Crypto’2001 Conf., 2001, ISBN: 978-3-540-42456-7, 213-229.10.1007/3-540-44647-8_13
  4. 4. Selvi, S., S. Vivek, N. Jain. Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. - In: Proc. of EUC’08 Conf., 2008, ISBN: 978-0-7695-3492-3, 127-132.
  5. 5. Selvi, S., S. Vivek, R. Gopalakrishnan. Cryptanalysis of Mu et al.'s and Li et al.'s Schemes anda Provably Secure id-Based Broadcast Signcryption (IBBSC) Seheme. - In: Proc. of WISA 2008 Conf., 2009, ISBN: 978-3-642-00305-9, 115-129.10.1007/978-3-642-00306-6_9
  6. 6. Gentry, C., S. Halevi. Hierarchical Identity Based Encryption with Polynomially Many Levels. - In: Proc. of TCC Conf., 2009, ISBN: 978-3-642-00456-8, 437-456.10.1007/978-3-642-00457-5_26
  7. 7. Waters, B. Dual System Encryption: Realizing Fully Secure IBEand HIBE Under Simple Assumptions. - In: Proc. of CRYPTO’2009 Conf., 2009, ISBN: 978-3-642-03355-1, 619-636.
  8. 8. Boyen, X. Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography. - In: Proc. of CRYPTO’2003 Conf., 2003, ISBN: 978-3-540-40674-7, 383-399.
  9. 9. Chase, M. Multi-Authority Attribute Based Encryption. - In: Proc. of TCC Conf., 2007, ISBN: 978-3-540-70935-0, 515-534.10.1007/978-3-540-70936-7_28
  10. 10. Chase, M., S. Chow. Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. - In: Proc. of ACM CCS Conf., 2009, ISBN: 978-1-60558-894-0, 121-130.
  11. 11. Maji, H., M. Prabhakaran, M. Rosulek. Attribute-Based Signature: Achieving Attribute- Privacy and Collusion-Resistance, 2008. http://eprint.iacr.org/2008/328
  12. 12. Khader, D. Attribute Based Group Signature With Revocation, 2007. http://eprint.iacr.org/2007/241.
  13. 13. Yu, S., C. Wang, K. Ren, W. Lou. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. - In: Proc. of INFOCOM Conf., 2010, ISBN: 978-1-4244-5836-3, 534-542.
  14. 14. Goh, E., H. Shacham, N. Modadugu, D. Boneh. Sirius: Securing Remote Untrusted Storage. - In: Proc. of NDSS Conf., 2003, ISBN: 1-891562-16-9, 131-145.
  15. 15. Blaze, M., G. Bleumer, M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. - In: Proc. of EUROCRYPT’98 Conf., 1998, ISBN: 978-3-540-64518-4, 127-144.10.1007/BFb0054122
  16. 16. Wang, G., Q. Liu, J. Wu. Achieving Fine-Grained Access Control for Secure Data Sharing on Cloud Servers. - Concurrency Comput. Pract. Exper., Vol. 23, 2011, No 12, 1443-1464.10.1002/cpe.1698
  17. 17. Wang, G., Q. Liu, J. Wu, M. Guo. Hierarchical Attribute-Based Encryption and Scalable User Revocation for Sharing Data in Cloud Servers. - Computers and Security, Vol. 30, 2011, No 5, 320-331.10.1016/j.cose.2011.05.006
  18. 18. Yu, S., C. Wang, K. Ren. Attribute Based Data Sharing With Attribute Revocation. - In: Proc. of ASIACCS Conf., 2010, ISBN: 978-1-60558-936-7, 261-270.
DOI: https://doi.org/10.2478/cait-2013-0027 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 77 - 90
Published on: Sep 20, 2013
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2013 Shan-Shan Tu, Shao-Zhang Niu, Meng-Jiao Li, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons License.