Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography and Relational Database Management Systems
IDEAS '01 Proceedings of the International Database Engineering & Applications Symposium
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Lazy Revocation in Cryptographic File Systems
SISW '05 Proceedings of the Third IEEE International Security in Storage Workshop
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Over-encryption: management of access control evolution on outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Cost-benefit analysis of Cloud Computing versus desktop grids
IPDPS '09 Proceedings of the 2009 IEEE International Symposium on Parallel&Distributed Processing
Data Security in the World of Cloud Computing
IEEE Security and Privacy
IEEE Security and Privacy
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
CRUST: cryptographic remote untrusted storage without public keys
International Journal of Information Security
Accountability as a Way Forward for Privacy Protection in the Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Communications of the ACM
Communications of the ACM
Outlook: Cloudy with a Chance of Security Challenges and Improvements
IEEE Security and Privacy
Attribute based data sharing with attribute revocation
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Towards Self-Assisted Troubleshooting for the Deployment of Private Clouds
CLOUD '10 Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing
IBM research division cloud computing initiative
IBM Journal of Research and Development
The case for enterprise-ready virtual private clouds
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Hi-index | 0.00 |
This paper addresses the issue of data governance in a cloud-based storage system. To achieve fine-grained access control over the outsourced data, we propose Self-Healing Attribute-based Privacy Aware Data Sharing in Cloud (SAPDS). The proposed system delegates the key distribution and management process to a cloud server without seeping out any confidential information. It facilitates data owner to restrain access of the user with whom data has been shared. User revocation is achieved by merely changing one attribute associated with the decryption policy, instead of modifying the entire access control policy. It enables authorized users to update their decryption keys followed by each user revocation, making it self-healing, without ever interacting with the data owner. Computation analysis of the proposed system shows that data owner can revoke n驴 users with the complexity of O(n驴). Besides this, legitimate users can update their decryption keys with the complexity of O(1).