ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Improving privacy and security in multi-authority attribute-based encryption
Proceedings of the 16th ACM conference on Computer and communications security
Secure and efficient access to outsourced data
Proceedings of the 2009 ACM workshop on Cloud computing security
Identity-Based Authentication for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Attribute based data sharing with attribute revocation
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Fuzzy keyword search over encrypted data in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
A fully homomorphic encryption scheme
A fully homomorphic encryption scheme
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Proceedings of the 17th ACM conference on Computer and communications security
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
EASiER: encryption-based access control in social networks with efficient revocation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Decentralizing attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
DACC: Distributed Access Control in Clouds
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
PRAM: privacy preserving access management scheme in cloud services
Proceedings of the 2013 international workshop on Security in cloud computing
Trends and research directions for privacy preserving approaches on the cloud
Proceedings of the 6th ACM India Computing Convention
Hi-index | 0.00 |
In this paper, we propose a new privacy preserving authenticated access control scheme for securing data in clouds. In the proposed scheme, the cloud verifies the authenticity of the user without knowing the user's identity before storing information. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.