2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering 2011
DOI: 10.1109/cnsi.2011.34
|View full text |Cite
|
Sign up to set email alerts
|

Attribute Based Proxy Re-encryption for Data Confidentiality in Cloud Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(26 citation statements)
references
References 6 publications
0
22
0
Order By: Relevance
“…Increasing the number of stored chunks, rapidly lowers the probability of a successful selection in the reverse engineering process due to uniform selection of virtual volumes. The V. RELATED WORK Literature identifies several approaches to tackle the problem of confidentiality in cloud: vulnerabilities identification and attack prevention [9], encryption mechanisms [10], [11], data segregation [12],or engineering cloud systems with special security features [13], [14]. These systems are constructed based on already known security concepts like PKI, encrypted communication protocols or security barriers protecting computing infrastructures.…”
Section: Resultsmentioning
confidence: 99%
“…Increasing the number of stored chunks, rapidly lowers the probability of a successful selection in the reverse engineering process due to uniform selection of virtual volumes. The V. RELATED WORK Literature identifies several approaches to tackle the problem of confidentiality in cloud: vulnerabilities identification and attack prevention [9], encryption mechanisms [10], [11], data segregation [12],or engineering cloud systems with special security features [13], [14]. These systems are constructed based on already known security concepts like PKI, encrypted communication protocols or security barriers protecting computing infrastructures.…”
Section: Resultsmentioning
confidence: 99%
“…Also, to prevent the trouble of key distribution and management, it proposes a modified Diffie-Hellman key interchange protocol between cloud service providers and the user for secretly sharing a symmetric key for secure data access. An additional paper [13] in cloud computing environments shows how to protect and ensure data confidentiality and fine-grained access control. The paper guaranteed data confidentiality by dividing and storing a data file into header and body.…”
Section: Related Workmentioning
confidence: 99%
“…In [5] the data is stored in the cloud using attribute-based encryption. The above scheme divides and store data file into header and body.…”
Section: Related Workmentioning
confidence: 99%