Achieving Anonymity with Fully Anonymous Attribute-Based Encryption and Controlling Access Privilege in Cloud
@article{Patil2017AchievingAW, title={Achieving Anonymity with Fully Anonymous Attribute-Based Encryption and Controlling Access Privilege in Cloud}, author={Snehanka K. Patil}, journal={International Journal for Research in Applied Science and Engineering Technology}, year={2017}, volume={5}, pages={31-39}, url={https://api.semanticscholar.org/CorpusID:56626314} }
A semi anonymous privilege management theme AnonyControl is proposed to handle not solely the data privacy, however conjointly the user identity privacy in existing access control schemes.
Figures from this paper
Topics
AnonyControl (opens in a new tab)Computing Paradigm (opens in a new tab)Security Analysis (opens in a new tab)Attribute-Based Encryption (opens in a new tab)Cloud Computing (opens in a new tab)Identity Privacy (opens in a new tab)Access Control (opens in a new tab)Computing Resources (opens in a new tab)Data Privacy (opens in a new tab)Clouds (opens in a new tab)
One Citation
35 References
Multi-authority ciphertext-policy attribute-based encryption with accountability
- 2011
Computer Science
This paper proposes a multi-authority ciphertext-policy (AND gates with wildcard) ABE scheme with accountability, which allows tracing the identity of a misbehaving user who leaked the decryption key to others, and thus reduces the trust assumptions not only on the authorities but also the users.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
- 2010
Computer Science, Engineering
This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements.
Anonymous attribute-based encryption supporting efficient decryption test
- 2013
Computer Science
A novel technique called match-then-decrypt, in which a matching phase is additionally introduced before the decryption phase, which greatly improves the efficiency of decryption in anonymous ABE.
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing
- 2011
Computer Science, Engineering
It is showed that the proposed Hierarchical Attribute-Set-Based Encryption (HASBE) scheme is not only efficient and flexible in dealing with access control for cloud computing, but also has the same security as CP-ASBE.
Improving privacy and security in multi-authority attribute-based encryption
- 2009
Computer Science
This paper proposes a solution which removes the trusted central authority, and protects the users' privacy by preventing the authorities from pooling their information on particular users, thus making ABE more usable in practice.
Secure Ranked Keyword Search over Encrypted Cloud Data
- 2010
Computer Science
This paper defines and solves the problem of effective yet secure ranked keyword search over encrypted cloud data, and proposes a definition for ranked searchable symmetric encryption, and gives an efficient design by properly utilizing the existing cryptographic primitive, order-preserving asymmetric encryption (OPSE).
Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing
- 2013
Computer Science
This work extends the well-known Chase and Chow's scheme for mobile users by introducing a cloud based semi-trusted-authority (STA) between the mobile user and attribute authorities and ensures the security and privacy of the proposed MA-ABE scheme is preserved.
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
- 2013
Computer Science
This paper constructs a new multiauthority CP-ABE scheme with efficient decryption, and design an efficient attribute revocation method that can achieve both forward security and backward security, and proposes an extensive data access control scheme (EDAC-MACS), which is secure under weaker security assumptions.
Multi-authority attribute-based encryption with honest-but-curious central authority
- 2012
Computer Science
A multi-authority attribute-based encryption scheme in which only the set of recipients defined by the encrypting party can decrypt a corresponding ciphertext, which is secure in the selective ID model and can tolerate an honest-but-curious central authority.
Attribute-based encryption for fine-grained access control of encrypted data
- 2006
Computer Science
This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.