2020
DOI: 10.1007/978-981-15-4739-3_92
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Data Sharing Using IDSS CP-ABE in Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…However, in an urgent situation, the break-glass access method evades the medical file's access policy to provide emergency treatment or rescue professionals immediate access to the data. Ezhilarasi et al (2022) describes a mobile-cloud computing architecture with a lightweight data exchange mechanism. It takes mechanism from the ciphertext-policy encryption based on attributes skill used in the cloud's virtual setting.…”
Section: Related Workmentioning
confidence: 99%
“…However, in an urgent situation, the break-glass access method evades the medical file's access policy to provide emergency treatment or rescue professionals immediate access to the data. Ezhilarasi et al (2022) describes a mobile-cloud computing architecture with a lightweight data exchange mechanism. It takes mechanism from the ciphertext-policy encryption based on attributes skill used in the cloud's virtual setting.…”
Section: Related Workmentioning
confidence: 99%
“…(5) The school and hospital, as attribute authorities in the system, respectively, execute the algorithm AA.Setup to generate their own public/private key pair. (6) To prevent this process from being compromised, the CRFs of the school and hospital execute the algorithm W AA .Setup to randomize their respective public and private key pair. (7) Considering that most patients usually use resource-constrained mobile devices, some computational operations are performed in the Encrypt.off algorithm.…”
Section: Conflicts Of Interestmentioning
confidence: 99%
“…Only when the attributes of the user meet the access structure of the ciphertext can the user use the private key to recover the plaintext correctly. Because users can use CP-ABE to specify flexible access structures for ciphertext, they can achieve fine-grained access control for ciphertext, so CP-ABE has been widely used in cloud computing [ 1 , 2 , 3 , 4 , 5 , 6 ]. Because the user’s private key is generated by an attribute authority, the attribute authority knows the user’s private key and can decrypt the ciphertext.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the current scheduling data network service information flow storage function mainly stores the information flow data generated for the remote communication between the station and the master station but lacks the storage function for the internal data flow of the master station system [30,31]. It is difficult to combine data network information flow with scheduling key services to carry out data flow fault anomaly discrimination based on business scenarios [32,33].…”
Section: Acquisition and Structured Storage Of Data Flowmentioning
confidence: 99%