2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6567100
|View full text |Cite
|
Sign up to set email alerts
|

DAC-MACS: Effective data access control for multi-authority cloud storage systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
126
0
2

Year Published

2015
2015
2018
2018

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 129 publications
(128 citation statements)
references
References 14 publications
0
126
0
2
Order By: Relevance
“…For instance, Ciphertext-Policy Attributebased Encryption (CP-ABE) requires a trusted authority that manages all the attributes and distributes keys in the system and cannot be directly applied to data access control for multiauthority cloud storage systems, due to the inefficiency of decryption and revocation. To address these problems Yang et al [20] propose DAC-MACS (Data Access Control for MultiAuthority Cloud Storage), an effective and secure data access control scheme with efficient decryption and revocation. In this scheme, a new multi-authority CP-ABE scheme with efficient decryption is built.…”
Section: Dac-macs: Effective Data Access Control For Multi-authority mentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, Ciphertext-Policy Attributebased Encryption (CP-ABE) requires a trusted authority that manages all the attributes and distributes keys in the system and cannot be directly applied to data access control for multiauthority cloud storage systems, due to the inefficiency of decryption and revocation. To address these problems Yang et al [20] propose DAC-MACS (Data Access Control for MultiAuthority Cloud Storage), an effective and secure data access control scheme with efficient decryption and revocation. In this scheme, a new multi-authority CP-ABE scheme with efficient decryption is built.…”
Section: Dac-macs: Effective Data Access Control For Multi-authority mentioning
confidence: 99%
“…Yang et al [20] An effective and secure data access control scheme with efficient decryption and revocation.…”
mentioning
confidence: 99%
“…However, the theme projected by Chase et al [6] considered the essential threshold-based KP-ABE, that lacks generality within the encoding policy expression. several attribute based encoding schemes having multiple authorities have been projected later [7]- [10], however they either additionally use a threshold-based ABE [7], or have a semi-honest central authority [8]- [10] haphazardly several users' collusion attack [7]. The work by Lewko et al [11] and Muller et al [12] square measure the most similar ones to in this they additionally tried to alter the central authority within the CP-ABE into multiple ones.…”
Section: IImentioning
confidence: 99%
“…Multiauthority ABE i.e. given in [18] and [19] it requires that user must have the attributes from all the KDC's. But all these cases the main limitation is that computation is intensive so that it might be inefficient when user access the data via mobile device.…”
Section: Literature Survey and Related Workmentioning
confidence: 99%