2018
DOI: 10.1109/jsyst.2016.2633559
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 58 publications
(29 citation statements)
references
References 31 publications
0
29
0
Order By: Relevance
“…This scheme guarantees users' revocation relying on the attribute authority to re-issue secret keys to remaining non-revoked users. Wei et al [31] have designed a decentralized cloud data sharing solution based on a multi-authority attribute based encryption scheme. Yang et al [32] have proposed a similar data sharing solution for cloud computing which is based on multi-authority attribute based encryption.…”
Section: A Attribute Based Encryption (Abe)mentioning
confidence: 99%
“…This scheme guarantees users' revocation relying on the attribute authority to re-issue secret keys to remaining non-revoked users. Wei et al [31] have designed a decentralized cloud data sharing solution based on a multi-authority attribute based encryption scheme. Yang et al [32] have proposed a similar data sharing solution for cloud computing which is based on multi-authority attribute based encryption.…”
Section: A Attribute Based Encryption (Abe)mentioning
confidence: 99%
“…The scheme is secure and efficient when applied in a real-world environment. Due to not complete trustworthiness for a cloud server Wei et al [29] proposed a secure and cost-effective access control scheme for multi-authority cloud storage system based on CP-ABE. The cloud storage access model supports scalable user revocation and dynamic ciphertext updating.…”
Section: Related Workmentioning
confidence: 99%
“…The factor of time was introduced to realize time-release encryption. 6,15 In some existing studies, [16][17][18][19] user revocation was supported in their CP-ABE schemes. In studies by Ning et al, 20,21 illegitimate access could be traced.…”
Section: R1mentioning
confidence: 99%