scispace - formally typeset
Journal ArticleDOI

Secure attribute-based data sharing for resource-limited users in cloud computing

TLDR
This paper proposes a new attribute-based data sharing scheme suitable for resource-limited mobile users in cloud computing and is proven secure against adaptively chosen-ciphertext attacks, which is widely recognized as a standard security notion.
About
This article is published in Computers & Security.The article was published on 2018-01-01. It has received 407 citations till now. The article focuses on the topics: Cloud computing security & Attribute-based encryption.

read more

Citations
More filters
Journal ArticleDOI

Significant Permission Identification for Machine-Learning-Based Android Malware Detection

TL;DR: Significant Permission IDentification (SigPID), a malware detection system based on permission usage analysis to cope with the rapid increase in the number of Android malware, is introduced.
Journal ArticleDOI

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

TL;DR: PASH is introduced, a privacy-aware s-health access control system, in which the key ingredient is a large universe CP-ABE with access policies partially hidden, and attribute values of access policies are hidden in encrypted SHRs and only attribute names are revealed.
Journal ArticleDOI

Data-Driven Cybersecurity Incident Prediction: A Survey

TL;DR: This survey paper investigates the emerging research in cybersecurity incident prediction by reviewing recent representative works appeared in the dominant period, and extracts and summarizes the data-driven research methodology commonly adopted in this fast-growing area.
Journal ArticleDOI

A hybrid particle swarm optimization algorithm using adaptive learning strategy

TL;DR: A hybrid PSO algorithm which employs an adaptive learning strategy (ALPSO) is developed in this paper, which performs much better than the others in more cases, on both convergence accuracy and convergence speed.
Journal ArticleDOI

Anonymous and Traceable Group Data Sharing in Cloud Computing

TL;DR: This paper focuses on enabling data sharing and storage for the same group in the cloud with high security and efficiency in an anonymous manner by leveraging the key agreement and the group signature to support anonymous multiple users in public clouds.
References
More filters
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Related Papers (5)