The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds
نویسندگان
چکیده
منابع مشابه
Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds
Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence is that users lack the ultimate authority to determine how their data is shared with other web services. In this paper, we introduce Sieve, a new platform which selectively (and...
متن کاملAn Efficient Role-based Access Control on Encrypted Data in Cloud
Cloud Computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Cloud Computing involves delivering hosted services over the internet. These services are broadly categorized into three types, Infrastructure-as-a –Service (IaaS), Platform-as-a-Service(PaaS) and Software-as-a-Service(SaaS). ...
متن کاملThe Blind Enforcer: On Fine-Grained Access Control Enforcement on Untrusted Clouds
Migration of one’s computing infrastructure to the cloud is gathering momentum with the emergence of relatively mature cloud computing technologies. As data and computation are being outsourced, concerns over data security (such as confidentiality, privacy and integrity) remain one of the greatest hurdles to overcome. In the meanwhile, the increasing need for sharing data between or within clou...
متن کاملStatistics on Encrypted Cloud Data
As an increasing number of data is to be processed, outsourcing data to the cloud environment becomes an appealing proposal to heighten the computation/storage efficiency, while avoiding costly and complicated system construction. However, it is necessary to encrypt the outsourced data to prevent the breaches of both data confidentiality and privacy. Most of the statistical procedures deal with...
متن کاملSearching Encrypted Data on Cloud
Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using the existing searchable encryption techniques, searching data on cloud server becomes diffi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3038838