Applying Geo-Encryption and Attribute Based Encryption to Implement Secure Access Control in the Cloud

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-Based Encryption: An Efficient Way to Secure Cloud Storage

Cloud computing is an emerging computing paradigm that enables users to remotely store their data on a cloud so as to enjoy scalable services on-demand. It has been found that maintaining the privacy of data from an unauthorized user is really a major challenge. This is a major concern as such data is outsourced to keep storage at third parties say cloud service providers. It is very much essen...

متن کامل

Secure Data Retrieval based on Attribute-based Encryption in Cloud

Cloud computing plays important role in the development of IT industry. It can help a small organization to headway their business. An organization can progress from small scale industry to large scale industry. “Cloud” basically internet based data, network, resource storage. Meanwhile security, integrity, confidentiality requirement need must be achieve by cloud implementation. Attribute base...

متن کامل

Secure Outsourced Attribute-based Encryption

Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by eligible users) are getting prohibitively high. Despite that the existing Outsourced ABE solutions a...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage

In order to save storage space, the data collected from body area networks can be stored in a third party. However, this may bring security problems. The common method is encrypting data before outsourcing. In this paper, we design a role-based access control scheme (RACS) used in the cloud. Firstly, we classify the data which are collected from body area networks into different types, and use ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of Computer Networks & Communications

سال: 2019

ISSN: 0975-2293,0974-9322

DOI: 10.5121/ijcnc.2019.11407