Fully Anonymous Attribute-Based Encryption with Privacy and Access Privilege

被引:0
|
作者
Kartik [1 ]
Chandrasekhar, B. N. [1 ]
Lakshmi, H. [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Informat Sci & Engn, Bangalore 560064, Karnataka, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS) | 2016年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
cloud computing is a progressive registering world-view, which empowers adaptable, on-interest, and ease use of figuring assets, yet the information is out sourced to some cloud servers, and different security concerns rise up out of it. Different plans taking into account the attribute based encryption have been proposed to secure the distributed storage. Be that as it may, most work spot lights on the information substance protection and the entrance control, while less consideration is paid to the benefit control and the identity privacy. In this paper, we introduce a completelyn fully anonymous privilege control plan Anony Control to address the information security, as well as the client personality protection in existing access control plans. Additionally, it like wise sums up the record access control to the benefit control, by which benefits of all operations on the cloud information can be overseen in fine-grained way. Our plan which completely keeps the identity leakage and accomplish thefull obscurity.
引用
收藏
页码:416 / 418
页数:3
相关论文
共 50 条
  • [1] Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
    Jung, Taeho
    Li, Xiang-Yang
    Wan, Zhiguo
    Wan, Meng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 190 - 199
  • [2] Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption (vol 10, pg 190, 2014)
    Jung, Taeho
    Li, Xiang-Yang
    Wan, Zhiguo
    Wan, Meng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 868 - 868
  • [3] Secure access privilege delegation using attribute-based encryption
    Panda, Suryakanta
    Mondal, Samrat
    Das, Ashok Kumar
    Susilo, Willy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1261 - 1276
  • [4] Secure access privilege delegation using attribute-based encryption
    Suryakanta Panda
    Samrat Mondal
    Ashok Kumar Das
    Willy Susilo
    International Journal of Information Security, 2023, 22 : 1261 - 1276
  • [5] Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption" (vol 10, pg 190, 2015)
    Ma, Hui
    Zhang, Rui
    Yuan, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 866 - 867
  • [6] Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures
    Zhang, Yinghui
    Zheng, Dong
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 870 - 874
  • [8] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [9] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [10] Fully secure attribute-based broadcast encryption
    Sun, J. (oksunjin@xaut.edu.cn), 2012, Science Press (39):