2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) 2015
DOI: 10.1109/ablaze.2015.7154994
|View full text |Cite
|
Sign up to set email alerts
|

An effective access from cloud data using attribute based encryption

Abstract: Cloud Computing is an important way of communicating and share data over internet. Cloud Computing enables transmission of data over internet and resource utilization at data centers. But during data sharing and resource utilization security plays a vital role since the chances of attacks increases. The data to be stored at data centers needs to be retrieved without any data loss and attack. Hence a multi key based data retrieved with encryption is proposed previously but the techniques require more computatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
(16 reference statements)
0
1
0
Order By: Relevance
“…Their scheme is a KP-ABE because it encrypts data based on a set of attributes and incorporates access policies in the user private keys. The key difference with the other KP-ABE schemes such as [72] is that it is based on elliptic curve cryptography (ECC) instead of bilinear pairing.…”
Section: ) Key Policy Attribute-based Encryption (Kp-abe)mentioning
confidence: 99%
“…Their scheme is a KP-ABE because it encrypts data based on a set of attributes and incorporates access policies in the user private keys. The key difference with the other KP-ABE schemes such as [72] is that it is based on elliptic curve cryptography (ECC) instead of bilinear pairing.…”
Section: ) Key Policy Attribute-based Encryption (Kp-abe)mentioning
confidence: 99%