scispace - formally typeset
Journal ArticleDOI

Multi-authority fine-grained access control with accountability and its application in cloud

Reads0
Chats0
TLDR
A privacy-aware multi-authority ciphertext-policy ABE scheme with accountability, which hides the attribute information in the ciphertext and allows to trace the dishonest user identity who shares the decryption key.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2018-06-15. It has received 112 citations till now. The article focuses on the topics: Attribute-based encryption & Encryption.

read more

Citations
More filters
Journal ArticleDOI

Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework

TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail.
Journal ArticleDOI

Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT

TL;DR: A new system for Cloud Computing integrated with Internet of Things as a base scenario for Big Data and an architecture relaying on the security of the network are proposed in order to improve their security issues.
Journal ArticleDOI

APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT

TL;DR: This work proposes APPA: a device-oriented Anonymous Privacy-Preserving scheme with Authentication for data aggregation applications in fog-enhanced IoT systems, which also supports multi-authority to manage smart devices and fog nodes locally.
Journal ArticleDOI

Block-secure: Blockchain based scheme for secure P2P cloud storage

TL;DR: A blockchain-based security architecture for distributed cloud storage, where users can divide their own files into encrypted data chunks, and upload those data chunks randomly into the P2P network nodes that provide free storage capacity is proposed.
Journal ArticleDOI

Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags

TL;DR: A new protocol is proposed that uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure and its comparison with other existing schemes is presented.
References
More filters
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Book ChapterDOI

Short Group Signatures

TL;DR: In this article, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Related Papers (5)