2017
DOI: 10.1109/jiot.2016.2571718
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
55
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 129 publications
(55 citation statements)
references
References 19 publications
0
55
0
Order By: Relevance
“…Fine‐grained. A lot of works already saw the potential of having an access control with fine‐grained control . As the IoT has a wide variety of information, the fine adjustments in the access control is very welcome in complex environments that requires it.…”
Section: Introductionmentioning
confidence: 99%
“…Fine‐grained. A lot of works already saw the potential of having an access control with fine‐grained control . As the IoT has a wide variety of information, the fine adjustments in the access control is very welcome in complex environments that requires it.…”
Section: Introductionmentioning
confidence: 99%
“…This system provides a quality model for cloud services, called CLOUDQUAL, which specifies six quality dimensions and five qualities metric and Security. But the main drawback is that offer an infinite amount of storage space.In this system with the help of cloud storage, users can store their data remotely and can enjoy the high demand quality applications and services from the computing resources which are available in a shared manner [9]. Local data storage and maintenance need not be considered.…”
Section: Review Of Literaturementioning
confidence: 99%
“…It also performs the operations on the data via a private key and a cipher text [87,[95][96][97][98]. It is separated into two categories as KP-ABE and CP-ABE [21,[99][100][101][102]. In the former category, the decryption key used for decrypting is made of many access structures and the operations are performed accordingly; however, in the latter category, the decryption key consists of many attributes [98,[103][104][105][106][107].…”
Section: Attribute Based Encryption Fine Grained Access Controlmentioning
confidence: 99%