2015
DOI: 10.1007/978-3-319-24177-7_8
|View full text |Cite
|
Sign up to set email alerts
|

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 66 publications
(22 citation statements)
references
References 28 publications
0
22
0
Order By: Relevance
“…For example when one wishes to share data such as multimedia content with different groups of users whose access rights may dynamically change. Therefore, to provide the scalability and flexibility of real-time multimedia data sharing, the fine-grained access control such as using delegation and secure sharing approaches are required (see [7,18,20,25]). …”
Section: Cryptographic Solutionsmentioning
confidence: 99%
“…For example when one wishes to share data such as multimedia content with different groups of users whose access rights may dynamically change. Therefore, to provide the scalability and flexibility of real-time multimedia data sharing, the fine-grained access control such as using delegation and secure sharing approaches are required (see [7,18,20,25]). …”
Section: Cryptographic Solutionsmentioning
confidence: 99%
“…However, the same data must be encrypted several times individually for each user, which may result in huge storage costs and calculation costs. Hence AttributeBased Encryption (ABE) has been attracting attention as the access control method in cloud [7]- [16]. Sahai et al [17] have proposed ABE as the method that extends the Identity-based encryption [18] which distinguish individuals on strings.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, CP-ABE is more appropriate to cloud storage than KP-ABE. CP-ABE schemes for cloud storage have proposed [7]- [9], [11]- [16]. Initially, in ABE schemes, a single authority generate the whole secret keys of users [17], [20]- [24].…”
Section: Introductionmentioning
confidence: 99%
“…Incident handling is a general strategy that guides an organisation in dealing with crises, and generally describes the types of incident, identifies the relevant person in‐charge, and outlines the action strategy. Both Cloud Service Providers (CSP) and Cloud Service Users (CSU) may find that ‘traditional’ incident handling procedures are not fit‐for‐purpose because of the challenges posed by the nature of cloud infrastructure . Furthermore, the requirements and challenges of the incident handling principles faced by CSUs and CSPs are likely to differ (e.g.…”
Section: Introductionmentioning
confidence: 99%