Fuzzy Authorization for Cloud Storage

  title={Fuzzy Authorization for Cloud Storage},
  author={Shasha Zhu and Guang Gong},
  journal={IEEE Transactions on Cloud Computing},
By leveraging and modifying ciphertext-policy attribute based encryption (CP-ABE) and OAuth, we propose a new authorization scheme, called fuzzy authorization, to facilitate an application registered with one cloud party to access data residing in another cloud party. The new proposed scheme enables the fuzziness of authorization to enhance the scalability and flexibility of file sharing by taking advantage of the one-to-one correspondence between linear secret-sharing scheme (LSSS) and… CONTINUE READING


Publications citing this paper.
Showing 1-8 of 8 extracted citations

Enhancing secure cloud computing environment by Detecting DDoS attack using fuzzy logic

2017 3rd International Conference on Electrical Information and Communication Technology (EICT) • 2017
View 1 Excerpt

Improving reliable cloud computing environment using fuzzy logic

2017 20th International Conference of Computer and Information Technology (ICCIT) • 2017
View 1 Excerpt

Modeling fuzzy based replication strategy to improve data availabiity in cloud datacenter

2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE'16) • 2016


Publications referenced by this paper.
Showing 1-10 of 36 references

Polynomial codes over certain finite fields

I. Reed, G. Solomon
J. Soc. Ind. Appl. Math., vol. 8, no. 2, pp. 300–304, 1960. • 1960
View 7 Excerpts
Highly Influenced

Fuzzy Identity Based Encryption

IACR Cryptology ePrint Archive • 2004
View 6 Excerpts
Highly Influenced

The oauth 2.0 authorization protocol

D. Balfanz, B. de Medeiros, D. Recordon, J. Smarr, A. Tom
Internet Draft, 2011. • 2011
View 4 Excerpts
Highly Influenced

Ciphertext-Policy Attribute-Based Encryption

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 9 Excerpts
Highly Influenced

Privacy-Preserving Public Auditing For Secure Cloud Storage

Salve Bhagyashri, Prof. Y. B. Gurav
View 2 Excerpts

Dynamic Audit Services for Outsourced Storages in Clouds

IEEE Transactions on Services Computing • 2013
View 1 Excerpt

Weak leakageresilient client - side deduplication of encrypted data in cloud storage , ” in Proceedings of the 8 th ACM SIGSAC symposium on Information , computer and communications security

C. Wang, S. S. Chow, Q. Wang, K. Ren, W. Lou
ACM • 2013

Characterizing 4G and 3G networks: Supporting mobility with multi-path TCP

Y.-C. Chen, E. M. Nahum, R. J. Gibbens, D. Towsley, Y. Lim
Univ. Massachusetts Amherst, Amherst, MA, USA, Tech. Rep. UM-CS-2012-022, 2012. • 2012
View 1 Excerpt

Similar Papers

Loading similar papers…