2017
DOI: 10.1155/2017/2713595
|View full text |Cite
|
Sign up to set email alerts
|

CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy

Abstract: CP-ABE (Ciphertext-Policy Attribute-Based Encryption) with hidden access control policy enables data owners to share their encrypted data using cloud storage with authorized users while keeping the access control policies blinded. However, a mechanism to prevent users from achieving successive access to a data owner’s certain number of data objects, which present a conflict of interest or whose combination thereof is sensitive, has yet to be studied. In this paper, we analyze the underlying relations among the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(35 citation statements)
references
References 23 publications
(72 reference statements)
0
35
0
Order By: Relevance
“…To handle the problems above, ABE technology, which was firstly proposed by Sahai and Water [25], is a promising tool. As a well-known data-sharing tool, many ABE schemes aiming at settling the challenges of confidentiality and flexibility in data access control have been proposed [26][27][28][29][30]. To enable the users to search on the encrypted files, Sun et al [26] proposed a fine-grained keyword search scheme.…”
Section: Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…To handle the problems above, ABE technology, which was firstly proposed by Sahai and Water [25], is a promising tool. As a well-known data-sharing tool, many ABE schemes aiming at settling the challenges of confidentiality and flexibility in data access control have been proposed [26][27][28][29][30]. To enable the users to search on the encrypted files, Sun et al [26] proposed a fine-grained keyword search scheme.…”
Section: Contributionsmentioning
confidence: 99%
“…To achieve lightweight computation, predecryption is provided in Ref. [30] and our system. As a result, task performers in both of the two systems can decrypt the ciphertext with their mobile devices efficiently.…”
Section: Chosen Keyword Attack Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Luo, Hu, and Chen [15] revealed another scheme to provide "AND" gates on both positive and negative attributes. Later on, a ciphertext-policy attribute-based proxy reencryption (CPAB-PRE) [16,17] was presented to support a monotonic access formula in the selective model. Further, they enhanced its security in the adaptive model [18].…”
Section: Introductionmentioning
confidence: 99%