2020
DOI: 10.1007/s12083-020-00940-3
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced attribute based access control with secure deduplication for big data storage in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 37 publications
0
8
0
Order By: Relevance
“…Beside, once the owner is offline, the access control will be entirely dependent on AP. Premkamal et al [19] proposed an enhanced scheme with attribute-based access control by using the group key with the help of trusted entities.…”
Section: B Deduplication With Dynamic Ownership Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Beside, once the owner is offline, the access control will be entirely dependent on AP. Premkamal et al [19] proposed an enhanced scheme with attribute-based access control by using the group key with the help of trusted entities.…”
Section: B Deduplication With Dynamic Ownership Managementmentioning
confidence: 99%
“…Second, to address dynamic ownership management, many schemes [4], [15]- [19] were proposed by using either trusted third party or semi-trusted third party to do proxy reencryption work, such as Authority Party (AP ) or The Public Cloud Provider (P ub − CSP ). On the one hand, it could be difficult to implement a trusted third party in practical applications [20].…”
Section: Introductionmentioning
confidence: 99%
“…This significant generation of data from several sources demands secure and reliable storage and exchange systems. Usually, the data is stored on cloud servers, however, this brings new concerns regarding data privacy, duplication and fine-grained access control [32], to the forefront. Thus, the technology of blockchain is being explored and utilized in various applications to investigate its effect and impact on record storage management and communication systems.…”
Section: Componential Classification Of Blockchain Privacy Protecting...mentioning
confidence: 99%
“…Microsoft, as well as EMC workflow, research shows that over 50%, besides 85% of information on main and subordinate devices of output, have been superfluous. One of the previous studies found that almost 80% of the organizations studying data deduction approaches over backup devices are pursuing to eliminate superfluous information to improve the productivity of their storage and to cut backup economy [1].…”
Section: Introductionmentioning
confidence: 99%