2011
DOI: 10.1016/j.cose.2011.05.006
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
113
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 210 publications
(113 citation statements)
references
References 2 publications
0
113
0
Order By: Relevance
“…This helps put customers at ease since they have a clear understanding of how their personal data will be used. The major threat to data confidentiality and privacy is from the employees of the Cloud service providers who have Table 10 Key Findings Key Findings References Cloud service providers face a plethora of security issues and need to implement various security measures [12,13,41] Different data security measures need to be put in place for the various phases of the data life cycle, specially to ensure data confidentiality and privacy [36,57] Cloud service providers should disclose exactly what personal data will be collected and what that data will be used for, thereby maintaining privacy and confidentiality [36] Data should be properly encrypted so that it cannot be accessed or misused by the employees of service provider [38,39] Malicious attacks from hackers need to be prevented at every stage of the data life cycle so that there is no breach of data confidentiality [40,43] Cloud services have to comply with the country's legal rules, which includes disclosing customer data to the law enforcement agencies if needed [13,37] access to customer data. In order to protect the data from being misused by the employees, it is necessary to have a good data encryption, which makes it difficult for employees to access the data itself, thereby ensuring privacy and data confidentiality.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This helps put customers at ease since they have a clear understanding of how their personal data will be used. The major threat to data confidentiality and privacy is from the employees of the Cloud service providers who have Table 10 Key Findings Key Findings References Cloud service providers face a plethora of security issues and need to implement various security measures [12,13,41] Different data security measures need to be put in place for the various phases of the data life cycle, specially to ensure data confidentiality and privacy [36,57] Cloud service providers should disclose exactly what personal data will be collected and what that data will be used for, thereby maintaining privacy and confidentiality [36] Data should be properly encrypted so that it cannot be accessed or misused by the employees of service provider [38,39] Malicious attacks from hackers need to be prevented at every stage of the data life cycle so that there is no breach of data confidentiality [40,43] Cloud services have to comply with the country's legal rules, which includes disclosing customer data to the law enforcement agencies if needed [13,37] access to customer data. In order to protect the data from being misused by the employees, it is necessary to have a good data encryption, which makes it difficult for employees to access the data itself, thereby ensuring privacy and data confidentiality.…”
Section: Discussionmentioning
confidence: 99%
“…[38]. A Cloud service provider, Skyhigh has conducted a survey amongst healthcare organizations regarding Cloud service usage and security risks.…”
Section: Confidentiality and Privacymentioning
confidence: 99%
“…HABE is the best control mechanism that provides the best scalability and flexibility. However, this was not enough for the system developers and the hybrid HASBE model was developed [90,91]. The most important feature of this access control is that it gives the information of which user, in a secure way, belongs to which class.…”
Section: Hierarchical Attribute Based Access Controlmentioning
confidence: 99%
“…However, CP-ABE and KP-ABE were not feasible to be applied for organisations where the users are arranged in a hierarchical manner or in groups. These limitations led to the development of several hierarchical-based ABE's (Yang et al, 2013;Yu et al, 2010;Wan et al, 2012;Wang et al, 2010Wang et al, , 2011 which provides the solution for applying the enhanced CP-ABE-based schemes for organisations with hierarchical structure. Most of the discussed methods make use of disjunctive normal form policy by assuming all attributes in one conjunctive clause leading to implementation difficulty and computational overheads.…”
Section: Related Workmentioning
confidence: 99%