2016
DOI: 10.1002/sec.1770
|View full text |Cite
|
Sign up to set email alerts
|

A robust cryptographic‐based system for secure data sharing in cloud environments

Abstract: Over the past few years, the usage of cloud storage services has been growing rapidly to share digital objects between data owner and consumers. However, such environment introduces many data privacy disclosure challenges. These challenges are maintaining data confidentiality, enforcing fine‐grained data access control, applying efficient user revocation mechanism, and resisting collusion between system users. In addition, such environment imposes the support of system scalability and generic implementation fe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 34 publications
(136 reference statements)
0
1
0
Order By: Relevance
“…Some examples of hash algorithms are MD5 and SHA. Cloud computing Infrastructure as a Service (IAAS) presents an important service to users through the internet which called cloud storage [3][4][5][6]. There are many advantages to this service such as possible remote data access at any time and on-demand resource deployment.…”
Section: Introductionmentioning
confidence: 99%
“…Some examples of hash algorithms are MD5 and SHA. Cloud computing Infrastructure as a Service (IAAS) presents an important service to users through the internet which called cloud storage [3][4][5][6]. There are many advantages to this service such as possible remote data access at any time and on-demand resource deployment.…”
Section: Introductionmentioning
confidence: 99%