2014
DOI: 10.1002/cpe.3286
|View full text |Cite
|
Sign up to set email alerts
|

Protecting outsourced data in cloud computing through access management

Abstract: Summary Data outsourcing is a major component for cloud computing because data owners are able to distribute resources to external services for sharing with users and organizations. A crucial problem for owners is how to secure sensitive information accessed by legitimate users only using the trusted services. We address the problem with access control methods to enforce selective access to outsourced data without involving the owner in authorization. The basic idea is to combine cryptography with authorizatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
15
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 55 publications
(16 citation statements)
references
References 22 publications
(21 reference statements)
0
15
0
1
Order By: Relevance
“…A misuse of the cloud-DCN resources can be considered as a threat that requires security-based behavior mechanisms to resist. Indeed, in such a context, security does not always relate to the traditional encryption/decryption algorithms; it extends to cloud data protection [17,18] and resource integrity. These resources are network and computing resources.…”
Section: Related Workmentioning
confidence: 99%
“…A misuse of the cloud-DCN resources can be considered as a threat that requires security-based behavior mechanisms to resist. Indeed, in such a context, security does not always relate to the traditional encryption/decryption algorithms; it extends to cloud data protection [17,18] and resource integrity. These resources are network and computing resources.…”
Section: Related Workmentioning
confidence: 99%
“…2006; Waters 2011; Masaud-Wahaishi and Gaouda 2011; Nishide and Yoneyama 2009; Cheung and Newport 2007; Wang et al. 2014). Goyal et al (2006) provided a Key-Policy ABE scheme, which allowed the policies (attached to keys) to be expressed by any monotonic formula over encrypted attributes (ciphertext).…”
Section: Related Workmentioning
confidence: 99%
“…For example copy and paste or cloning can lead to redundant and inaccurate information in EHRs. Using this feature can cause authorship integrity issues since documentation cannot be tracked to the original source [9,[33][34][35]].…”
Section: Motivationmentioning
confidence: 99%