scispace - formally typeset
Journal ArticleDOI

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers

TLDR
This paper proposes a hierarchical attribute- based encryption scheme (HABE) by combining a hierarchical identity-based encryption (HIBE) system and a ciphertext-policy attribute-based encrypted system (CP-ABE), and proposes a scalable revocation scheme by applying proxy re-encryption (PRE) and lazy re-Encryption (LRE) to the HABE scheme, so as to efficiently revoke access rights from users.
About
This article is published in Computers & Security.The article was published on 2011-07-01. It has received 248 citations till now. The article focuses on the topics: Client-side encryption & On-the-fly encryption.

read more

Citations
More filters
Journal ArticleDOI

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment

TL;DR: A time-based proxy re-encryption (TimePRE) scheme to allow a user's access right to expire automatically after a predetermined period of time, so that the data owner can be offline in the process of user revocations.
Journal ArticleDOI

A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments

TL;DR: A basic attribute-based encryption scheme, two various access policy attribute- based encryption schemes, and twoVarious access structures, which are analyzed for cloud environments are surveyed and compared.
Journal ArticleDOI

Research issues for privacy and security of electronic health services

TL;DR: This survey categorize and evaluate state-of-the-art electronic health system research based on their architecture, as well as services including access control, emergency access, sharing, searching, and anonymity methods by considering their cryptographic approaches.
Journal ArticleDOI

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

TL;DR: This survey brings a critical comparative analysis of cryptographic defense mechanisms, and beyond this, it explores research directions and technology trends to address the protection of outsourced data in cloud infrastructures.
Journal ArticleDOI

Flexible Data Access Control Based on Trust and Reputation in Cloud Computing

TL;DR: A scheme to control data access in cloud computing based on trust evaluated by the data owner and/or reputations generated by a number of reputation centers in a flexible manner is proposed by applying Attribue-Based Encryption and Proxy Re-Encryption.
References
More filters
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Related Papers (5)