2017
DOI: 10.1504/ijhpcn.2017.083196
|View full text |Cite
|
Sign up to set email alerts
|

HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud

Abstract: Cloud computing is one term that has evolved drastically over the years. It involves deploying groups of remote servers and software that are networked, that will allow centralised data storage and online access to computer services or resources. However, an important problem in public clouds is how to selectively share data based on fine-grained attribute-based access control policies while at the same time assuring confidentiality of the data and preserving the privacy of users from the cloud. Keeping in min… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The proposed system emphasizes the elimination of all the above stated factors that are discussed in the existing systems ( 23 , 41 , 42 ). The architecture of the proposed system is shown in Figure 1 .…”
Section: System Modelmentioning
confidence: 99%
“…The proposed system emphasizes the elimination of all the above stated factors that are discussed in the existing systems ( 23 , 41 , 42 ). The architecture of the proposed system is shown in Figure 1 .…”
Section: System Modelmentioning
confidence: 99%
“…The hierarchy enables proper separation of the levels and permissions of each user type. Viswanatham and Senthilkumar [34] proposed the so-called hierarchy-based user privacy, where the information is encrypted and decrypted based on access levels and releases.…”
Section: User Parametermentioning
confidence: 99%
“…In the SubBytes stage, using an 8-bit substitution box, eachbyte in the state array is substitutedwith a SubByte. The substitution-box is resultant from the multiplicative inverse above GF (28).In order to avoid attacks, S-box is made by combining the inverse function.…”
Section: Initial Round Key Additionmentioning
confidence: 99%