2013 5th International Conference on Intelligent Networking and Collaborative Systems 2013
DOI: 10.1109/incos.2013.22
|View full text |Cite
|
Sign up to set email alerts
|

Secure Cloud File System with Attribute Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Time Overhead: To measure the efficiency of the encryption and decryption algorithms, five texts (200 B, 400MB, 600B, 800B and 1000B) were encrypted with four different numbers of attributes in the access structure, and then decrypted with a secret key that is associated with same attributes. The result of our method Session Based Cipher Policy -Attribute Based Encryption and CP-ABE-WP [16] conducted experiment is as follows: This result can be interpreted like fig 1. IT shows the performance of both methods. It clearly shows that the performance of the Session-Based-CP-ABE is much better and takes lesser execution time to encrypt the data through the method.…”
Section: Results and Analysismentioning
confidence: 89%
See 1 more Smart Citation
“…Time Overhead: To measure the efficiency of the encryption and decryption algorithms, five texts (200 B, 400MB, 600B, 800B and 1000B) were encrypted with four different numbers of attributes in the access structure, and then decrypted with a secret key that is associated with same attributes. The result of our method Session Based Cipher Policy -Attribute Based Encryption and CP-ABE-WP [16] conducted experiment is as follows: This result can be interpreted like fig 1. IT shows the performance of both methods. It clearly shows that the performance of the Session-Based-CP-ABE is much better and takes lesser execution time to encrypt the data through the method.…”
Section: Results and Analysismentioning
confidence: 89%
“…In addition every user needs to have two sets of keys: secret attribute key shares and attribute KEKs. Shuaishuai Zhu, Xiaoyuan Yang and XuGuang Wu [16] work on secure and practical attribute based encryption scheme without pairings (CP-ABE-WP) under cloud computing scenarios. It presents a new practical Attribute based Encryption Scheme without Pairing (CP-ABE-WP).…”
Section: Related Workmentioning
confidence: 99%
“…They evaluated their work in terms of security and efficiency and concluded that this method enhances security as well as decreases the computation time as compared to the traditional CP-ABE approaches. Zhu et al (2013) proposed a new file sharing scheme based on ABE on cloud environment. File sharing systems are the most common services provided by the service providers.…”
Section: Related Workmentioning
confidence: 99%
“…Zhu et al [1] proposed an idea to secure cloud file system with attribute based encryption. It is one of the most effective ways to manage and control file sharing in cloud.…”
mentioning
confidence: 99%
“…The proposed approach shows a secure file sharing scheme based on attribute controlling. A secure and practical attribute based encryption scheme pairings (CP-ABE-WP) was designed [1]. The second approach to secure cloud storage, proposed by Bernd Zwattendorfer [2], is to first secure the authentication process using eIDs.…”
mentioning
confidence: 99%