Fully Anonymous Attribute-Based Encryption with Privacy and Access Privilege

被引:0
作者
Kartik [1 ]
Chandrasekhar, B. N. [1 ]
Lakshmi, H. [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Informat Sci & Engn, Bangalore 560064, Karnataka, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS) | 2016年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
cloud computing is a progressive registering world-view, which empowers adaptable, on-interest, and ease use of figuring assets, yet the information is out sourced to some cloud servers, and different security concerns rise up out of it. Different plans taking into account the attribute based encryption have been proposed to secure the distributed storage. Be that as it may, most work spot lights on the information substance protection and the entrance control, while less consideration is paid to the benefit control and the identity privacy. In this paper, we introduce a completelyn fully anonymous privilege control plan Anony Control to address the information security, as well as the client personality protection in existing access control plans. Additionally, it like wise sums up the record access control to the benefit control, by which benefits of all operations on the cloud information can be overseen in fine-grained way. Our plan which completely keeps the identity leakage and accomplish thefull obscurity.
引用
收藏
页码:416 / 418
页数:3
相关论文
共 50 条
[41]   Privacy-Aware Attribute-Based Encryption with User Accountability [J].
Li, Jin ;
Ren, Kui ;
Zhu, Bo ;
Wan, Zhiguo .
INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 :347-+
[42]   Fully Outsourced Attribute-Based Encryption with Verifiability for Cloud Storage [J].
Zhao Z. ;
Wang J. ;
Xu K. ;
Guo S. .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (02) :442-452
[43]   Generic Constructions for Fully Secure Revocable Attribute-Based Encryption [J].
Yamada, Kotoko ;
Attrapadung, Nuttapong ;
Emura, Keita ;
Hanaoka, Goichiro ;
Tanaka, Keisuke .
COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 :532-551
[44]   Attribute-based fully homomorphic encryption scheme over rings [J].
Zheng Y.-H. ;
Kang Y.-J. ;
Gu C.-X. ;
Dong H. .
Tongxin Xuebao/Journal on Communications, 2017, 38 (04) :55-63
[45]   Generic Constructions for Fully Secure Revocable Attribute-Based Encryption [J].
Yamada, Kotoko ;
Attrapadung, Nuttapong ;
Emura, Keita ;
Hanaoka, Goichiro ;
Tanaka, Keisuke .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) :1456-1472
[46]   Fully Secure Online/Offline Predicate and Attribute-Based Encryption [J].
Datta, Pratish ;
Dutta, Ratna ;
Mukhopadhyay, Sourav .
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 :331-345
[47]   Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing [J].
Zhao, Xiaolong ;
Huang, Zhenjie .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08) :10437-10453
[48]   Cross-Domain Attribute-Based Access Control Encryption [J].
Sedaghat, Mahdi ;
Preneel, Bart .
CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 :3-23
[49]   Attribute-Based Encryption with Non-Monotonic Access Structures [J].
Ostrovsky, Rafail ;
Sahai, Amit ;
Waters, Brent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :195-+
[50]   ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX [J].
Michalas, Antonis ;
Bakas, Alexandros ;
Hai-Van Dang ;
Zalitko, Alexandr .
CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, :183-183