A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A cryptographic solution to implement access control in a hierarchy and more
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Concealing complex policies with hidden credentials
Proceedings of the 11th ACM conference on Computer and communications security
Policy-hiding access control in open environment
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
The SCIFC Model for Information Flow Control in Web Service Composition
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Improving Web Service Security and Privacy
SERVICES '11 Proceedings of the 2011 IEEE World Congress on Services
Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
The Computer Journal
Cloud Data Protection for the Masses
Computer
A new strong multiple designated verifiers signature
International Journal of Grid and Utility Computing
A new proxy blind signature scheme
International Journal of Grid and Utility Computing
From cloud computing to cloud manufacturing
Robotics and Computer-Integrated Manufacturing
PPPDM - a privacy-preserving platform for data mashup
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
Fine-grained access control schemes are commonly used in cloud computing. In this type of schemes, each data item is given its own access control policy. The entity that wants to access the data item needs to provide its credentials to a policy enforcer. In a cloud environment, normally, the policy enforcer is not the owner of the data. The access control policies and the credentials might reveal some information that the policy enforcer is not entitled to know. This paper proposes a fine-grained access control scheme. It prevents the policy enforcers from comprehending the access control policies and the entities' credentials by using cryptographic techniques. Compared with the existing schemes, the proposed scheme provides higher level privacy.