2018
DOI: 10.1016/j.procs.2018.10.126
|View full text |Cite
|
Sign up to set email alerts
|

CS-IBE: A Data Confidentiality System in Public Cloud Storage System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…For example, outsourcing stored data at the cloud requires an additional security layer to strengthen the data confidentiality. Research [51] introduced a ''cloud storage based on ID-based encryption'' (CS-IBE) with the one file access policy and a user's identity proposed to be used as an encryption key. Although this approach simplifies the key management issues, it shows limited performance for data confidentiality.…”
Section: A Security Threats and Risk Mitigation Strategies (Rq1)mentioning
confidence: 99%
“…For example, outsourcing stored data at the cloud requires an additional security layer to strengthen the data confidentiality. Research [51] introduced a ''cloud storage based on ID-based encryption'' (CS-IBE) with the one file access policy and a user's identity proposed to be used as an encryption key. Although this approach simplifies the key management issues, it shows limited performance for data confidentiality.…”
Section: A Security Threats and Risk Mitigation Strategies (Rq1)mentioning
confidence: 99%
“…One of the rising techniques for tending to this problem is cryptography. Bentajer et al [12] presented the ID-based encryption design, i.e., CS-IBE, for using public cloud storage that targets to secure the confidentiality of sensitive information. According to CS-IBE, configuration files are associated with single file accession practice with the client ID which will be utilized as the key to encipher.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The main concerns are about confidentiality, integrity and privacy of the outsourced data [2,3] CSPs are leveraging cryptography as lever for mitigating security concerns in order to strength confidence of end users on their services. Cryptography can be involved in two major levels of security, namely secure storage [11,[4][5][6][7] and secure gain provided by the solution. The lack of detailed technical information about the solution and about the span of its adoption by final cloud users make the final statement very difficult.…”
Section: Introductionmentioning
confidence: 99%