2017
DOI: 10.1002/cpe.4364
|View full text |Cite
|
Sign up to set email alerts
|

An improved attribute‐based encryption technique towards the data security in cloud computing

Abstract: Summary With the rapid development of the Internet, resource and knowledge sharing are two major problems experienced due to the presence of many hackers and malicious users. In this paper, an efficient and secure access control model has been proposed for the cloud computing environment for resource and knowledge sharing by using attribute‐based encryption (ABE), distributed hash table (DHT) network, and identity‐based timed‐release encryption (IDTRE). Here, at first, data or resources are encrypted by using … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
41
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 111 publications
(45 citation statements)
references
References 39 publications
1
41
0
1
Order By: Relevance
“…An efficient method to protect the data, low running time, and increased throughput [29] More secured and accurate against attacks [25] Coloured Image Efficient for the colored image, strong resistance, strong computational load, timesaving [22] Inefficient with multiple colour image Steganography Image Less distortion in the sense of color correlation, equipped with the extended CMD strategy [38] Cannot be directly applied to JPEG image with YCbCr images…”
Section: Cloud Environmentmentioning
confidence: 99%
“…An efficient method to protect the data, low running time, and increased throughput [29] More secured and accurate against attacks [25] Coloured Image Efficient for the colored image, strong resistance, strong computational load, timesaving [22] Inefficient with multiple colour image Steganography Image Less distortion in the sense of color correlation, equipped with the extended CMD strategy [38] Cannot be directly applied to JPEG image with YCbCr images…”
Section: Cloud Environmentmentioning
confidence: 99%
“…However, it cannot accomplish the fine‐grained access control where different users possess different access rights for the same information. To support differential access rights in multiuser setting, there were several attribute‐based encryption schemes proposed in the literature. These ABE schemes were used to construct attribute‐based searchable (ABKS) schemes where the access policy was used to determine which users can perform search like it was used to determine who can decrypt the data.…”
Section: Related Workmentioning
confidence: 99%
“…The environment class includes two papers . The work of Aktas and Astekin belongs to the dimension of grids.…”
Section: Progress Of Research On Semantics Knowledge and Gridsmentioning
confidence: 99%
“…It utilizes a complex‐event processing technique by applying rule‐based pattern detection on the events generated in real time. Namasudra presents an approach to support data security in cloud computing platform.…”
Section: Progress Of Research On Semantics Knowledge and Gridsmentioning
confidence: 99%
See 1 more Smart Citation