Efficient Sharing of Secure Cloud Storage Services

@article{Liu2010EfficientSO,
  title={Efficient Sharing of Secure Cloud Storage Services},
  author={Qing Liu and Guojun Wang and Jie Wu},
  journal={2010 10th IEEE International Conference on Computer and Information Technology},
  year={2010},
  pages={922-929}
}
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob is the user at the upper level and all the employees in the company are the users at the lower level. In this paper, we design and construct a scheme, which enables the user at the upper level to efficiently share the secure cloud storage services with all the users at the lower level. A sender can specify several… CONTINUE READING
Highly Cited
This paper has 37 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
Showing 1-10 of 26 extracted citations

PKI-based cryptography for secure cloud data storage using ECC

2014 International Conference on Information and Communication Technology Convergence (ICTC) • 2014
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 18 references

HIBE with Polynomially Many Levels

View 4 Excerpts
Highly Influenced

Hierarchical Identity Based Encryption with Constant Size Ciphertext

IACR Cryptology ePrint Archive • 2005
View 4 Excerpts
Highly Influenced

Hierarchical ID-Based Cryptography

IACR Cryptology ePrint Archive • 2002
View 4 Excerpts
Highly Influenced

An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing

2009 International Conference on Computational Science and Engineering • 2009

Improving privacy and security in multi-authority attribute-based encryption

ACM Conference on Computer and Communications Security • 2009
View 2 Excerpts

Cloud computing — Issues, research and implementations

ITI 2008 - 30th International Conference on Information Technology Interfaces • 2008

Similar Papers

Loading similar papers…