Cloud Storage That Makes Use Of A Feature-Based Encoding Hierarchy To Maximize Efficiency
Abstract
References
T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “k-times attribute-based anonymous access control for cloud comput-ing,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2595–2608, Sep. 2015.
J.K.Liu,M.H.Au ,X.Huang, R.Lu,andJ.Li, “Fine-grainedtwo-factor access control for Web-based cloud computing services,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 484–497, Mar. 2016.
A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer, May 2005, pp. 457–473.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryp-tion for fine-grained access control of encrypted data,” in Proc. 13th ACM Conf. Comput. Commun. Secur., Oct. 2006, pp. 89–98.
W. Zhu, J. Yu, T. Wang, P. Zhang, and W. Xie, “Efficient attribute-based encryption from R-LWE,” Chin.J.Electron., vol. 23, no. 4, pp. 778–782, Oct. 2014.
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321–334.
L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proc. 14th ACM Conf. Comput. Commun. Secur., Oct. 2007, pp. 456–465.
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. 10th Int. Workshop Inf. Secur. Appl., Aug. 2009, pp. 309–323.
X. Xie, H. Ma, J. Li, and X. Chen, “An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing,” J. Universal Comput. Sci., vol. 19, no. 16, pp. 2349–2367, Oct. 2013.
F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, “CYPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION with constant-size keys for lightweight devices,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 763–771, May 2014.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.