2018
DOI: 10.1109/jsyst.2017.2667679
|View full text |Cite
|
Sign up to set email alerts
|

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
125
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 168 publications
(125 citation statements)
references
References 40 publications
0
125
0
Order By: Relevance
“…In recent years, a variety of applications based on IoT with different areas have been developed, such as logistics, manufacturing, healthcare, industrial surveillance, and etc [33] [25]. 15 Meanwhile, a number of corresponding techniques, such as intelligent sensors, wireless networks, big data analysis and mining [40], have been developed to realize the potential of the IoT with different intelligent systems [6] [30]. Cloud computing is one of them.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, a variety of applications based on IoT with different areas have been developed, such as logistics, manufacturing, healthcare, industrial surveillance, and etc [33] [25]. 15 Meanwhile, a number of corresponding techniques, such as intelligent sensors, wireless networks, big data analysis and mining [40], have been developed to realize the potential of the IoT with different intelligent systems [6] [30]. Cloud computing is one of them.…”
Section: Introductionmentioning
confidence: 99%
“…If the attributes embedded in the ciphertext fit those held by the user, then he/her decrypts such ciphertext [17]. There are some basic CP-ABE schemes [18][19][20][21]24,27,28,31], in which the size of the ciphertext grows linearly with the number of attributes embedded in access policy. In order to improve efficiency, Emura et al [21] presented a CP-ABE scheme with constant ciphertext size.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [34,35] presented two searchable outsourced ABE schemes, which can implement ciphertext keyword search for cloud storage. In order to resist collusion attack, Li et al [31] proposed efficiently CP-ABE schemes for avoiding user collusion with attribute revocation. Rahulamathavan et al [32] proposed an improved scheme, which mitigated the user collusion security vulnerability with preserving the user's privacy.…”
Section: Related Workmentioning
confidence: 99%
“…In order to create a SPE scheme supporting disjunctive keyword search, katz et al [14] proposed a public key encryption scheme called inner product encryption (IPE), which is related to the attribute-based encryption (ABE) [30,31]. Recently, in order to better utilize the encrypted data and improve the security, some public key schemes which can support verifiable attribute-based search over outsourced encrypted data are proposed in [32][33][34][35][36][37].…”
Section: Introductionmentioning
confidence: 99%