Fully Anonymous Attribute-Based Encryption with Privacy and Access Privilege

被引:0
作者
Kartik [1 ]
Chandrasekhar, B. N. [1 ]
Lakshmi, H. [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Informat Sci & Engn, Bangalore 560064, Karnataka, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS) | 2016年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
cloud computing is a progressive registering world-view, which empowers adaptable, on-interest, and ease use of figuring assets, yet the information is out sourced to some cloud servers, and different security concerns rise up out of it. Different plans taking into account the attribute based encryption have been proposed to secure the distributed storage. Be that as it may, most work spot lights on the information substance protection and the entrance control, while less consideration is paid to the benefit control and the identity privacy. In this paper, we introduce a completelyn fully anonymous privilege control plan Anony Control to address the information security, as well as the client personality protection in existing access control plans. Additionally, it like wise sums up the record access control to the benefit control, by which benefits of all operations on the cloud information can be overseen in fine-grained way. Our plan which completely keeps the identity leakage and accomplish thefull obscurity.
引用
收藏
页码:416 / 418
页数:3
相关论文
共 50 条
[21]   Fine-grained access control system based on fully outsourced attribute-based encryption [J].
Zhang, Rui ;
Ma, Hui ;
Lu, Yao .
JOURNAL OF SYSTEMS AND SOFTWARE, 2017, 125 :344-353
[22]   A fully distributed hierarchical attribute-based encryption scheme [J].
Ali, Mohammad ;
Mohajeri, Javad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
THEORETICAL COMPUTER SCIENCE, 2020, 815 :25-46
[23]   Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption [J].
Mandal, Mriganka .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
[24]   Efficient attribute-based encryption with hidden access structures [J].
Xie, Li ;
Ren, Yanli .
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2015, 42 (03) :97-102
[25]   Privilege separation of data sharing scheme using attribute-based encryption [J].
Zhu, Hui ;
Lei, Wan ;
Huang, Rong ;
Li, Hui ;
Liu, Xi-Meng .
Tongxin Xuebao/Journal on Communications, 2014, 35 :53-62
[26]   Attribute-based encryption with hidden threshold access structure [J].
Zeng, Fugeng ;
Xu, Chunxiang .
Computer Modelling and New Technologies, 2014, 18 (12) :19-22
[27]   Levelled attribute-based encryption for hierarchical access control [J].
Le, Huy Quoc ;
Le, Phi Thuong ;
Trinh, Sy Tuan ;
Susilo, Willy ;
Trinh, Viet Cuong .
COMPUTER STANDARDS & INTERFACES, 2025, 93
[28]   On the Feasibility of Attribute-Based Encryption for WLAN Access Control [J].
Pisa, Claudio ;
Dargahi, Tooska ;
Caponi, Alberto ;
Bianchi, Giuseppe ;
Blefari-Melazzi, Nicola .
2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, :783-790
[29]   Attribute-based encryption with hidden policies in the access tree [J].
Song, Yan ;
Han, Zhen ;
Liu, Feng-Mei ;
Liu, Lei .
Tongxin Xuebao/Journal on Communications, 2015, 36 (09) :119-126
[30]   FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumptions [J].
Meng, Long ;
Chen, Liqun ;
Tian, Yangguang ;
Manulis, Mark .
PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024, 2024, :4688-4702