Privacy Preserving Policy-Based Content Sharing in Public Clouds

@article{Nabeel2013PrivacyPP,
  title={Privacy Preserving Policy-Based Content Sharing in Public Clouds},
  author={Mohamed Nabeel and Ning Shang and Elisa Bertino},
  journal={IEEE Transactions on Knowledge and Data Engineering},
  year={2013},
  volume={25},
  pages={2602-2614}
}
An important problem in public clouds is how to selectively share documents based on fine-grained attribute-based access control policies (acps). An approach is to encrypt documents satisfying different policies with different keys using a public key cryptosystem such as attribute-based encryption, and/or proxy re-encryption. However, such an approach has some weaknesses: it cannot efficiently handle adding/revoking users or identity attributes, and policy changes; it requires to keep multiple… CONTINUE READING
Highly Cited
This paper has 103 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 72 extracted citations

An analysis of privacy preservation schemes in cloud computing

2016 IEEE International Conference on Engineering and Technology (ICETECH) • 2016
View 8 Excerpts
Highly Influenced

Study of applicability of Chinese remainder theorem based group key management for cloud environment

2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) • 2015
View 7 Excerpts
Highly Influenced

Homomorphic Encryption Approach For Cloud Data Security

Suraj Sheshrao Gaikwad, Amar Buchade
2016
View 4 Excerpts
Highly Influenced

Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection

Punya Peethambaran, Dr. Jayasudha
2014
View 3 Excerpts
Highly Influenced

Survey on Two Layer Encryption System

Uma B. Ajantiwale, Meriem Kemel
2014
View 5 Excerpts
Highly Influenced

103 Citations

0102030'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 103 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 30 references

Fuzzy Identity Based Encryption

IACR Cryptology ePrint Archive • 2004
View 7 Excerpts
Highly Influenced

OACerts: Oblivious Attribute Certificates

IEEE Transactions on Dependable and Secure Computing • 2005
View 3 Excerpts
Highly Influenced

A privacy-preserving approach to policy-based content dissemination

2010 IEEE 26th International Conference on Data Engineering (ICDE 2010) • 2010

Oblivious transfer with access control

ACM Conference on Computer and Communications Security • 2009
View 1 Excerpt

A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing

IEEE INFOCOM 2008 - The 27th Conference on Computer Communications • 2008
View 1 Excerpt

CSI Computer Crime and Security Survey

R. Richardson
http://www.ppclub.org/CSIsurvey2008.pdf, Computer Secu­ rity Institute, Tech. Rep., 2008. • 2008
View 1 Excerpt

Similar Papers

Loading similar papers…