Journal ArticleDOI
Multi-authority fine-grained access control with accountability and its application in cloud
Reads0
Chats0
TLDR
A privacy-aware multi-authority ciphertext-policy ABE scheme with accountability, which hides the attribute information in the ciphertext and allows to trace the dishonest user identity who shares the decryption key.About:
This article is published in Journal of Network and Computer Applications.The article was published on 2018-06-15. It has received 112 citations till now. The article focuses on the topics: Attribute-based encryption & Encryption.read more
Citations
More filters
Journal ArticleDOI
Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
Aakanksha Tewari,Brij B. Gupta +1 more
TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail.
Journal ArticleDOI
Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT
TL;DR: A new system for Cloud Computing integrated with Internet of Things as a base scenario for Big Data and an architecture relaying on the security of the network are proposed in order to improve their security issues.
Journal ArticleDOI
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT
TL;DR: This work proposes APPA: a device-oriented Anonymous Privacy-Preserving scheme with Authentication for data aggregation applications in fog-enhanced IoT systems, which also supports multi-authority to manage smart devices and fog nodes locally.
Journal ArticleDOI
Block-secure: Blockchain based scheme for secure P2P cloud storage
Jiaxing Li,Jigang Wu,Long Chen +2 more
TL;DR: A blockchain-based security architecture for distributed cloud storage, where users can divide their own files into encrypted data chunks, and upload those data chunks randomly into the P2P network nodes that provide free storage capacity is proposed.
Journal ArticleDOI
Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags
Aakanksha Tewari,Brij B. Gupta +1 more
TL;DR: A new protocol is proposed that uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure and its comparison with other existing schemes is presented.
References
More filters
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI
Attribute-based encryption for fine-grained access control of encrypted data
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Book ChapterDOI
Short Group Signatures
TL;DR: In this article, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.