2016
DOI: 10.1002/sec.1474
|View full text |Cite
|
Sign up to set email alerts
|

Identity‐based key management for cloud computing

Abstract: Recently, cloud computing has drawn much attention from research and industrial communities. With adoption of cloud computing, data providers can reap huge economic benefits by outsourcing their data to cloud. Because of serious privacy concerns, sensitive data should be encrypted before being outsourced. In order to share the encrypted and outsourced data, data providers need to distribute different keys to legal users. Thus, in the scenario of multiple data providers, a legal user may receive lots of keys fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…The first one is indirect revocation, where users are revoked by updating the ciphertext and redistributing keys only to valid users. The second one is direct revocation, where the system revokes access of invalid users to ciphertext by updating ciphertext and revocation list without key redistributions.…”
Section: Introductionmentioning
confidence: 99%
“…The first one is indirect revocation, where users are revoked by updating the ciphertext and redistributing keys only to valid users. The second one is direct revocation, where the system revokes access of invalid users to ciphertext by updating ciphertext and revocation list without key redistributions.…”
Section: Introductionmentioning
confidence: 99%