Corpus ID: 26195818

MULTI-AUTHORITY ATTRIBUTE BASED ENCRYPTION IN CLOUD COMPUTING FOR AGRICULTURE

@inproceedings{Rajeshwari2016MULTIAUTHORITYAB,
  title={MULTI-AUTHORITY ATTRIBUTE BASED ENCRYPTION IN CLOUD COMPUTING FOR AGRICULTURE},
  author={K. Rajeshwari},
  year={2016}
}
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this… Expand
Revocable, Decentralized Multi-Authority Access Control System
TLDR
This paper proposes a new CP-ABE scheme that tackles most of the existing work’s limitations and securely allows storing data on a public cloud storage system by employing multiple authorities which manage a joint set of attributes. Expand
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
TLDR
This is the first review paper analysing the major issues of CP-ABE in the IoT paradigm and explaining the existing approaches to addressing these issues, with the main focus on their ability to address the revocation issues. Expand
Exponential Cipher Based Concealed Policy In CP-Abe For Trusted Cloud Environment
In several access control systems of a cloud, any data can be accessed by many different users and expecting a trusted environment from those scenarios is always a challenging and complex task. CloudExpand
Credit Card Fraud Detection Using Machine Learning
TLDR
This paper presents a novel and scalable approach called "Smart Card Fraud Detection Using Machine Learning" that can be used to detect credit card fraud in real-time. Expand

References

SHOWING 1-10 OF 20 REFERENCES
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing
TLDR
It is showed that the proposed Hierarchical Attribute-Set-Based Encryption (HASBE) scheme is not only efficient and flexible in dealing with access control for cloud computing, but also has the same security as CP-ASBE. Expand
Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing
TLDR
This work extends the well-known Chase and Chow's scheme for mobile users by introducing a cloud based semi-trusted-authority (STA) between the mobile user and attribute authorities and ensures the security and privacy of the proposed MA-ABE scheme is preserved. Expand
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
Ciphertext-Policy Attribute-Based Encryption
TLDR
A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented. Expand
Anonymous attribute-based encryption supporting efficient decryption test
TLDR
A novel technique called match-then-decrypt, in which a matching phase is additionally introduced before the decryption phase, which greatly improves the efficiency of decryption in anonymous ABE. Expand
Improving privacy and security in multi-authority attribute-based encryption
TLDR
This paper proposes a solution which removes the trusted central authority, and protects the users' privacy by preventing the authorities from pooling their information on particular users, thus making ABE more usable in practice. Expand
Multi-authority ciphertext-policy attribute-based encryption with accountability
TLDR
This paper proposes a multi-authority ciphertext-policy (AND gates with wildcard) ABE scheme with accountability, which allows tracing the identity of a misbehaving user who leaked the decryption key to others, and thus reduces the trust assumptions not only on the authorities but also the users. Expand
Attribute-based encryption for fine-grained access control of encrypted data
TLDR
This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption. Expand
Multi-authority attribute-based encryption with honest-but-curious central authority
TLDR
A multi-authority attribute-based encryption scheme in which only the set of recipients defined by the encrypting party can decrypt a corresponding ciphertext, which is secure in the selective ID model and can tolerate an honest-but-curious central authority. Expand
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
TLDR
This paper presents a threshold multi authority fuzzy identity based encryption (MA-FIBE) scheme without a central authority for the first time and the security proof is based on the secrecy of the underlying joint random secret sharing protocol and joint zero secret share protocol and the standard decisional bilinear Diffie-Hellman assumption. Expand
...
1
2
...