2022
DOI: 10.1109/tpds.2021.3094126
|View full text |Cite
|
Sign up to set email alerts
|

A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing

Abstract: The cloud computing paradigm provides numerous tempting advantages, enabling users to store and share their data conveniently. However, users are naturally resistant to directly outsourcing their data to the cloud since the data often contain sensitive information. Although several fine-grained access control schemes for cloud-data sharing have been proposed, most of them focus on the access control of the encrypted data (e.g., restricting the decryption capabilities of the receivers). Distinct from the existi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 42 publications
(57 reference statements)
0
3
0
Order By: Relevance
“…In order to [18][20] aid the retrieval of efficient cipher text and keep up with the challenging performance, this paper proposes an encryption scheme that is lightweight attribute-based searchable encryption (LABSE), which recognizes the access control that is fine gained and the keyword search. During the reduction of the overhead for computation of the devices that are resourceconstrained [21], [22]. The proposed work is an authentication user group that is content-centric to assure the accuracy and security of the data shared.…”
Section: Figure 1 Cloud Security Componentmentioning
confidence: 99%
“…In order to [18][20] aid the retrieval of efficient cipher text and keep up with the challenging performance, this paper proposes an encryption scheme that is lightweight attribute-based searchable encryption (LABSE), which recognizes the access control that is fine gained and the keyword search. During the reduction of the overhead for computation of the devices that are resourceconstrained [21], [22]. The proposed work is an authentication user group that is content-centric to assure the accuracy and security of the data shared.…”
Section: Figure 1 Cloud Security Componentmentioning
confidence: 99%
“…Data at network edge: The ensuing deluge of data generated at the edges places a heavy burden on data administration and raises other issues [77].…”
Section: A Limitation Of Eimentioning
confidence: 99%
“…Other recognized issues related to security and privacy in cloud computing include multi-tenancy, confidentiality, and phishing [62]. Meanwhile, the security issues discussed in edge computing are mainly divided into the following four topics: access control [63,64], identity authentication [65,66], data security [67,68], and privacy [69,70].…”
Section: Security Collaborationmentioning
confidence: 99%