2019
DOI: 10.1002/ett.3667
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of attribute‐based cryptographic techniques and their application to protect cloud services

Abstract: Recent technological advances such as the Internet of Things (IoT), fog computing, cloud applications lead to exponential growth in the amount of generated data. Indeed, cloud storage services have experienced unprecedented usage demand. The loss of user control over their cloud stored data introduced several security and privacy concerns. To address these concerns, cryptographic techniques are widely adopted at the user side. Attribute based cryptography is commonly used to provide encrypted and/or authentica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 119 publications
0
23
0
Order By: Relevance
“…Security was common concern among all the reviewed SDN approaches; hence, in future work, we plan to investigate the resilience of various control plane systems against a variety of security attacks [41,42]. In particular, investigating how to leverage SND features to secure the Internet of Things [43,44] presents an opportunity that is of great interest to both research communities. Finally, communication and synchronization between controllers in large-scale systems remains a central area of research in the SDN community.…”
Section: Discussionmentioning
confidence: 99%
“…Security was common concern among all the reviewed SDN approaches; hence, in future work, we plan to investigate the resilience of various control plane systems against a variety of security attacks [41,42]. In particular, investigating how to leverage SND features to secure the Internet of Things [43,44] presents an opportunity that is of great interest to both research communities. Finally, communication and synchronization between controllers in large-scale systems remains a central area of research in the SDN community.…”
Section: Discussionmentioning
confidence: 99%
“…Several security solutions have been proposed in the literature to provide secure data sharing in cloud [1], [17], [18]. Indeed, cryptographic mechanisms have been usually applied to achieve fine grained access control for remote storage systems [19], [20], [21].…”
Section: Attribute Based Cryptographymentioning
confidence: 99%
“…Hence, the result of malicious attacks can have severe consequences on human lives, business productivity and national security. In the following, we highlight some of the key security threats to CPS; we refer interested readers to the following works [3,5,9,20,32] for an extensive treatment of the topic.…”
Section: Cps Security Threats and Motivationmentioning
confidence: 99%
“…CPS can bring a number of benefits to citizens, business and governments. However, securing these systems in a piecemeal mode has proven a monumental challenge [5]. With the continuous implementation of time-and safety-critical applications of CPS, the security risks and costs of potential attacks will continue to grow.…”
Section: Introductionmentioning
confidence: 99%