The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds

Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence is that users lack the ultimate authority to determine how their data is shared with other web services. In this paper, we introduce Sieve, a new platform which selectively (and...

متن کامل

An Efficient Role-based Access Control on Encrypted Data in Cloud

Cloud Computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Cloud Computing involves delivering hosted services over the internet. These services are broadly categorized into three types, Infrastructure-as-a –Service (IaaS), Platform-as-a-Service(PaaS) and Software-as-a-Service(SaaS). ...

متن کامل

The Blind Enforcer: On Fine-Grained Access Control Enforcement on Untrusted Clouds

Migration of one’s computing infrastructure to the cloud is gathering momentum with the emergence of relatively mature cloud computing technologies. As data and computation are being outsourced, concerns over data security (such as confidentiality, privacy and integrity) remain one of the greatest hurdles to overcome. In the meanwhile, the increasing need for sharing data between or within clou...

متن کامل

Statistics on Encrypted Cloud Data

As an increasing number of data is to be processed, outsourcing data to the cloud environment becomes an appealing proposal to heighten the computation/storage efficiency, while avoiding costly and complicated system construction. However, it is necessary to encrypt the outsourced data to prevent the breaches of both data confidentiality and privacy. Most of the statistical procedures deal with...

متن کامل

Searching Encrypted Data on Cloud

Encryption is an optimistic way to preserve the secrecy of the outsource data. On other hand, performing search operation on encrypted data is a complicated job. A lot of encryption techniques have been suggested by researchers to avoid improper usage of unstructured data on the cloud. But still by using the existing searchable encryption techniques, searching data on cloud server becomes diffi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.3038838