Proceedings ArticleDOI
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds
Qin Liu,Guojun Wang,Jie Wu +2 more
- pp 304-305
TLDR
A clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable user revocation in unreliable clouds and allows the data owner and the cloud to share a secret key in advance.Abstract:
In this paper, we propose a clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable user revocation in unreliable clouds. Our scheme, which is built on top of cipher text-policy attribute-based encryption (CP-ABE) and proxy re-encryption (PRE), allows the data owner and the cloud to share a secret key in advance, with which the cloud can be delegated to re-encrypt data on behalf of the data owner. The main merit of our scheme is that the cloud can automatically re-encrypt data based on its internal clock without receiving any command.read more
Citations
More filters
Journal ArticleDOI
Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds
TL;DR: Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user.
Book ChapterDOI
Secure Data Sharing in the Cloud
TL;DR: Cloud systems can be used to enable data sharing capabilities and this can provide an abundant of benefits to the user.
Journal ArticleDOI
Anonymous attribute-based proxy re-encryption for access control in cloud computing
TL;DR: This paper formalizes the notion of anonymous ciphertext-policy attribute-based proxy re-encryption anonymous CP-ABPRE and proposes a novel technique called match-then-re-encrypt, in which a matching phase is additionally introduced before the re- Encryption phase.
Journal ArticleDOI
Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs
TL;DR: This research focuses on securing the entire process of data migration to cloud from devices while the in‐cloud data flow is monitored by the Information Flow Control policies specified by the users.
Journal ArticleDOI
Towards Secure Data Distribution Systems in Mobile Cloud Computing
TL;DR: This paper uses several cryptographic primitives such as a new type-based proxy re-encryption to design a secure and efficient data distribution system in MCC, which provides data privacy, data integrity, data authentication, and flexible data distribution with access control.
References
More filters
Journal ArticleDOI
A view of cloud computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Book ChapterDOI
Divertible protocols and atomic proxy cryptography
TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Proceedings ArticleDOI
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Guojun Wang,Qin Liu,Jie Wu +2 more
TL;DR: This paper proposes a scheme to help enterprises to efficiently share confidential data on cloud servers by first combining the HIBE system and the ciphertext-policy attribute-based encryption (CP-ABE) system, and then making a performance-expressivity tradeoff.