Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Secure Cloud Database with Fine-Grained Access Control

Outsourcing data to cloud environments can offer ease of access, provisioning, and cost benefits, but makes the data more vulnerable to disclosure. Loss of complete control over the data can be offset through encryption, but this approach requires an omniscient third party key authority to handle key management, increasing overhead complexity. We present the ZeroVis framework that provides conf...

متن کامل

Review of " Achieving Secure , Scalable , and Fine - grained Data Access Control in Cloud Computing

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensi...

متن کامل

Fine-grained Access of Personal Health Record in Cloud Computing

Cloud computing is used broadly in various services which maintain Personal Health Record (PHR). It is an emerging Health-centric model of patient health information interchange. Personal Health Record (PHR) information can be stored in a third party server i.e.Cloud server. The most important issues are fine–grained access, cryptographically enforced data access control, scalability in key man...

متن کامل

Achieving fine-grained access control for secure data sharing on cloud servers

With more and more enterprises sharing their sensitive data on cloud servers, building a secure cloud environment for data sharing has attracted a lot of attention in both industry and academic communities. In this paper, we propose a conjunctive precise and fuzzy identity-based encryption (PFIBE) scheme for secure data sharing on cloud servers, which allows the encryption of data by specifying...

متن کامل

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2020

ISSN: 1545-5971,1941-0018,2160-9209

DOI: 10.1109/tdsc.2020.3001557