Privacy Enhanced Access Control for Outsourced Data Sharing

@inproceedings{Raykova2012PrivacyEA,
  title={Privacy Enhanced Access Control for Outsourced Data Sharing},
  author={Mariana Raykova and Hang Zhao and Steven M. Bellovin},
  booktitle={Financial Cryptography},
  year={2012}
}
Traditional access control models often assume that the entity enforcing access control policies is also the owner of data and resources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider. However, in this setting, access control policies as well as users’ access patterns also become privacy… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 39 CITATIONS

A Detailed Study on Security Services in Cloud Environment

  • 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)
  • 2017
VIEW 1 EXCERPT
CITES METHODS

An enhanced study on cloud data services using security technologies

  • 2017 International Conference on Intelligent Computing and Control (I2C2)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 14 REFERENCES

Encryption-Based Policy Enforcement for Cloud Storage

  • 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops
  • 2010
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Tight budget? look to the ‘Cloud

Vivek Kundra
  • The New York Times,
  • 2011
VIEW 1 EXCERPT

Oblivious RAM Revisited

  • IACR Cryptology ePrint Archive
  • 2010
VIEW 1 EXCERPT