Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
نویسندگان
چکیده
منابع مشابه
Towards Secure Cloud Database with Fine-Grained Access Control
Outsourcing data to cloud environments can offer ease of access, provisioning, and cost benefits, but makes the data more vulnerable to disclosure. Loss of complete control over the data can be offset through encryption, but this approach requires an omniscient third party key authority to handle key management, increasing overhead complexity. We present the ZeroVis framework that provides conf...
متن کاملReview of " Achieving Secure , Scalable , and Fine - grained Data Access Control in Cloud Computing
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensi...
متن کاملFine-grained Access of Personal Health Record in Cloud Computing
Cloud computing is used broadly in various services which maintain Personal Health Record (PHR). It is an emerging Health-centric model of patient health information interchange. Personal Health Record (PHR) information can be stored in a third party server i.e.Cloud server. The most important issues are fine–grained access, cryptographically enforced data access control, scalability in key man...
متن کاملAchieving fine-grained access control for secure data sharing on cloud servers
With more and more enterprises sharing their sensitive data on cloud servers, building a secure cloud environment for data sharing has attracted a lot of attention in both industry and academic communities. In this paper, we propose a conjunctive precise and fuzzy identity-based encryption (PFIBE) scheme for secure data sharing on cloud servers, which allows the encryption of data by specifying...
متن کاملA Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2020
ISSN: 1545-5971,1941-0018,2160-9209
DOI: 10.1109/tdsc.2020.3001557