Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

@article{Wei2018SecureAE,
  title={Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage},
  author={Jianghong Wei and Wenfen Liu and Xuexian Hu},
  journal={IEEE Systems Journal},
  year={2018},
  volume={12},
  pages={1731-1742}
}
Cloud storage facilitates both individuals and enterprises to cost effectively share their data over the Internet. [...] Key Result In addition, the proposed scheme is proven secure in the random oracle model.Expand Abstract

Citations

Publications citing this paper.
SHOWING 1-10 OF 10 CITATIONS

Dynamic Data Access Control for Multi-Authority Cloud Storage

  • Jian Wang, Chun-xiao Ye, Yangfei Ou
  • Computer Science
  • 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
  • 2019
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud

VIEW 1 EXCERPT
CITES BACKGROUND

A Secure Cloud Storage Framework With Access Control Based on Blockchain

VIEW 1 EXCERPT
CITES BACKGROUND

Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications

VIEW 2 EXCERPTS
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 32 REFERENCES

A framework of multi-authority attribute-based encryption with outsourcing and revocation,

  • S.S.M. Chow
  • in Proc. 21st ACM Symp. Access Control Models Technol.,
  • 2016
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Efficient decentralized attribute-based access control for cloud storage with user revocation

VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

An Efficient and Secure User Revocation Scheme in Mobile Social Networks

VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Secure Schemes for Secret Sharing and Key Distribution

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Secure, efficient and revocable multi-authority access control system in cloud storage

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption

VIEW 14 EXCERPTS
HIGHLY INFLUENTIAL

Attribute based data sharing with attribute revocation

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Fuzzy Identity-Based Encryption

VIEW 13 EXCERPTS
HIGHLY INFLUENTIAL