Fully Anonymous Attribute-Based Encryption with Privacy and Access Privilege

被引:0
作者
Kartik [1 ]
Chandrasekhar, B. N. [1 ]
Lakshmi, H. [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Informat Sci & Engn, Bangalore 560064, Karnataka, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS) | 2016年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
cloud computing is a progressive registering world-view, which empowers adaptable, on-interest, and ease use of figuring assets, yet the information is out sourced to some cloud servers, and different security concerns rise up out of it. Different plans taking into account the attribute based encryption have been proposed to secure the distributed storage. Be that as it may, most work spot lights on the information substance protection and the entrance control, while less consideration is paid to the benefit control and the identity privacy. In this paper, we introduce a completelyn fully anonymous privilege control plan Anony Control to address the information security, as well as the client personality protection in existing access control plans. Additionally, it like wise sums up the record access control to the benefit control, by which benefits of all operations on the cloud information can be overseen in fine-grained way. Our plan which completely keeps the identity leakage and accomplish thefull obscurity.
引用
收藏
页码:416 / 418
页数:3
相关论文
共 50 条
  • [21] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [22] Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption
    Mandal, Mriganka
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [23] Efficient attribute-based encryption with hidden access structures
    School of Communication and Information Engineering, Shanghai Univ., Shanghai
    200444, China
    Xi'an Dianzi Keji Daxue Xuebao, 3 (97-102): : 97 - 102
  • [24] Privilege separation of data sharing scheme using attribute-based encryption
    Zhu, Hui
    Lei, Wan
    Huang, Rong
    Li, Hui
    Liu, Xi-Meng
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 53 - 62
  • [25] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [26] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [27] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [28] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [29] Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing
    Zhang, Yinghui
    Zheng, Dong
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 807 - 814
  • [30] A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure
    Rifki, Sadikin
    Park, YoungHo
    Moon, SangJae
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 247 - 265