2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.28
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Access Control for Outsourced Personal Records

Abstract: Cloud storage has rapidly become a cornerstone of many IT infrastructures, constituting a seamless solution for the backup, synchronization, and sharing of large amounts of data. Putting user data in the direct control of cloud service providers, however, raises security and privacy concerns related to the integrity of outsourced data, the accidental or intentional leakage of sensitive information, the profiling of user activities and so on. Furthermore, even if the cloud provider is trusted, users having acce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 51 publications
(28 citation statements)
references
References 54 publications
(58 reference statements)
0
25
0
Order By: Relevance
“…To demonstrate the general applicability of our functional credential construction, we deploy it in the setting of Group ORAM (GORAM) [37], a state-of-the-art multi-client oblivious outsourced storage in which access control is enforced via predicate encryption and zero-knowledge proofs. More precisely, the authors encode the access control policy for each entry in a predicate encryption ciphertext and distribute a key to each client according to her permissions.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…To demonstrate the general applicability of our functional credential construction, we deploy it in the setting of Group ORAM (GORAM) [37], a state-of-the-art multi-client oblivious outsourced storage in which access control is enforced via predicate encryption and zero-knowledge proofs. More precisely, the authors encode the access control policy for each entry in a predicate encryption ciphertext and distribute a key to each client according to her permissions.…”
Section: Methodsmentioning
confidence: 99%
“…Even for large parameters, the computation and verification of a credential takes only a couple of seconds. -We show the effectiveness of our techniques on a recently proposed oblivious outsourced storage scheme [37]: We instantiate the authentication mechanism with functional credentials, obtaining better scalability and an improvement in efficiency of at least one order of magnitude.…”
Section: Our Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…Their scheme supports a user revocation by redistributing users' private keys and update an access policy in ciphertexts. GORAM and A-GORAM [10] are suggested to provide a secure data sharing on the untrusted cloud storage. They provide a fine-grained access control using PE and hiding even an access patterns from the server.…”
Section: Related Workmentioning
confidence: 99%