2015
DOI: 10.1007/978-3-319-24018-3_7
|View full text |Cite
|
Sign up to set email alerts
|

DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption

Abstract: Many works in the literature have proposed information security mechanisms relying on Paring Based Cryptography (PBC), for example, Ciphertext Policy Attribute Based Encryption (CP-ABE). However, a public set of software modules that allow integrating that kind of encryption for data security of information systems in an easy and transparent way is still missing. Available APIs like PBC (C-based) or jPBC (Java-based) are focused on low level arithmetic operations and several non trivial issues must still be ad… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…high, medium, and low) 1 . III) In the Mitigation Phase, a security module performs the encryption of the file depending on the risk scoring detected in the previous phase by using a multi-level security engine, which uses symmetric encryption to ensure privacy and confi-85 dentiality [20], attribute-based encryption to ensure confidentiality and access control [21,22,13], and digital signatures to ensure integrity and authentication [23,13]. Security level can be changed onthe-fly and the security level for the three types of 90 encryption is determined based on the risk level detected on the file content/context (The bigger the risk level, the larger the size of the encryption keys) and the access control attributes are chosen for each file depending on the context (The attributes of the 95 users included in a sharing operations are on-thefly defined and used in the encryption/decryption of each file).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…high, medium, and low) 1 . III) In the Mitigation Phase, a security module performs the encryption of the file depending on the risk scoring detected in the previous phase by using a multi-level security engine, which uses symmetric encryption to ensure privacy and confi-85 dentiality [20], attribute-based encryption to ensure confidentiality and access control [21,22,13], and digital signatures to ensure integrity and authentication [23,13]. Security level can be changed onthe-fly and the security level for the three types of 90 encryption is determined based on the risk level detected on the file content/context (The bigger the risk level, the larger the size of the encryption keys) and the access control attributes are chosen for each file depending on the context (The attributes of the 95 users included in a sharing operations are on-thefly defined and used in the encryption/decryption of each file).…”
Section: Introductionmentioning
confidence: 99%
“…A realization of digital envelopes from ABE based on symmetric cryptography (AES) to encrypt data and policy-based attribute to encrypt the AES key by using public key cryptography has been [22] proposed. In this model, only the recipient of the dig-195 ital envelope, with its private key, can decrypt the key with which to decrypt the data.…”
mentioning
confidence: 99%