2015
DOI: 10.1016/j.future.2014.12.001
|View full text |Cite
|
Sign up to set email alerts
|

Server-aided anonymous attribute-based authentication in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…The DEMATEL technique was developed for the purpose of showing a network relation diagram, and a structural model for understanding specific societal problems. These basic concepts were used to create a series of new hybrid MADM models for solving complex and dynamic real world problems [32,33,59,60]. The DEMATEL technique involves three steps, detailed as follows:…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The DEMATEL technique was developed for the purpose of showing a network relation diagram, and a structural model for understanding specific societal problems. These basic concepts were used to create a series of new hybrid MADM models for solving complex and dynamic real world problems [32,33,59,60]. The DEMATEL technique involves three steps, detailed as follows:…”
Section: Discussionmentioning
confidence: 99%
“…Cloud computing has changed the security landscape of enterprises from internal to external networks, with increased emphasis on identification, and message and data protection [31]. Liu et al [32] assert that basic anonymous cloud computing server verification can ensure user identity confidentiality and effective customer management.…”
Section: Automating User Provisioningmentioning
confidence: 99%
“…However the cloud server never authenticates whether the policy updating key is from the actual data owner in these schemes, the owners' data will be vulnerable to security attacks. The Attribute-Based Signature(ABS) [16] is adapted to ABE based access scheme to realize the anonymous authentication in [17,18], but they can't directly enable the cloud to authenticate the owner's policy updating key. Furthermore, in the ABE based access control system that uses the ABS scheme to realize the authentication, the authorities have to maintain double attributes.…”
Section: Related Workmentioning
confidence: 99%
“…To endorse a message, the signer is allowed to generate a signature with his/her attributes satisfying the predicate without leaking other information. Providing data authenticity in this anonymous manner [7], ABS has been brought into much focus. It is widely accepted to build cloud-based messaging services [8][9][10], which make management of dynamic environment easier.…”
Section: Introductionmentioning
confidence: 99%