Fully Anonymous Attribute-Based Encryption with Privacy and Access Privilege

被引:0
作者
Kartik [1 ]
Chandrasekhar, B. N. [1 ]
Lakshmi, H. [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Informat Sci & Engn, Bangalore 560064, Karnataka, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS) | 2016年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
cloud computing is a progressive registering world-view, which empowers adaptable, on-interest, and ease use of figuring assets, yet the information is out sourced to some cloud servers, and different security concerns rise up out of it. Different plans taking into account the attribute based encryption have been proposed to secure the distributed storage. Be that as it may, most work spot lights on the information substance protection and the entrance control, while less consideration is paid to the benefit control and the identity privacy. In this paper, we introduce a completelyn fully anonymous privilege control plan Anony Control to address the information security, as well as the client personality protection in existing access control plans. Additionally, it like wise sums up the record access control to the benefit control, by which benefits of all operations on the cloud information can be overseen in fine-grained way. Our plan which completely keeps the identity leakage and accomplish thefull obscurity.
引用
收藏
页码:416 / 418
页数:3
相关论文
共 50 条
[31]   A privacy preserving attribute-based encryption scheme with user revocation [J].
Li, Jiguo ;
Shi, Yuerong ;
Zhang, Yichen .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10) :2281-2292
[32]   Recipient anonymous ciphertext-policy attribute-based broadcast encryption [J].
Zhang, Leyou ;
Yin, Hongjian .
International Journal of Network Security, 2018, 20 (01) :168-176
[33]   Attribute-based encryption [J].
Sahai, Amit ;
Waters, Brent ;
Lu, Steve .
Cryptology and Information Security Series, 2009, 2 :156-168
[34]   Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing [J].
Zhang, Yinghui ;
Zheng, Dong .
ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 :807-814
[35]   A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure [J].
Rifki, Sadikin ;
Park, YoungHo ;
Moon, SangJae .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) :247-265
[36]   Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [J].
Lewko, Allison ;
Okamoto, Tatsuaki ;
Sahai, Amit ;
Takashima, Katsuyuki ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 :62-+
[37]   A novel approach for privacy homomorphism using attribute-based encryption [J].
Doshi, Nishant ;
Jinwala, Devesh C. .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4451-4467
[38]   Attribute-Based Encryption Method for Data Privacy Security Protection [J].
Li, Ziqian ;
He, Yeshen ;
Zhang, Yiying ;
Li, Siwei ;
Wang, Cong ;
Zhang, Xiankun .
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 :458-467
[39]   Security-Enhanced Function Privacy Attribute-Based Encryption [J].
Li, Xinmin ;
Zhang, Leyou ;
Hou, Xuanyang .
FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 :176-188
[40]   A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation [J].
Yin, Hongjian ;
Zhang, Leyou ;
Mu, Yi .
CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 :435-446