Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing

@article{Teng2017AttributeBasedAC,
  title={Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing},
  author={Wei Teng and Geng Yang and Yang Xiang and Shaobo Zhang and Dongyang Wang},
  journal={IEEE Transactions on Cloud Computing},
  year={2017},
  volume={5},
  pages={617-627}
}
With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data in an untrusted environment is an urgent issue that needs to be solved. Attribute-based encryption (ABE) is a promising scheme suitable for access control in cloud storage systems… CONTINUE READING
Highly Cited
This paper has 31 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

Comparative study on attribute-based encryption for health records in cloud storage

2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) • 2017
View 6 Excerpts
Highly Influenced

An Approach towards Securing Data in Cloud Computing

Miss. V. T. Lanjewar, Prof. R. V. Dharaskar, Dr. V. M. Thakare
2016
View 4 Excerpts
Highly Influenced

Cloud Data Security Using Attribute-Based Key-Aggregate Cryptosystem

2018 International Conference on Research in Intelligent and Computing in Engineering (RICE) • 2018
View 1 Excerpt

Data security storage model for fog computing in large-scale IoT application

IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) • 2018
View 1 Excerpt

An approach for advanced multi-authority access control system for public cloud storage

2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) • 2017
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 31 references

Ciphertext-Policy Attribute-Based Encryption

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 11 Excerpts
Highly Influenced

Identity-Based Cryptosystems and Signature Schemes

CRYPTO • 1984
View 6 Excerpts
Highly Influenced

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

IEEE Transactions on Information Forensics and Security • 2012
View 5 Excerpts
Highly Influenced

Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers

G. Wanga, Q. Liu, J. Wu, M. Guo
Comput. Security, vol. 30, pp. 320–331, 2011. • 2011
View 4 Excerpts
Highly Influenced

DACC: Distributed Access Control in Clouds

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications • 2011
View 2 Excerpts

Similar Papers

Loading similar papers…