Nothing Special   »   [go: up one dir, main page]

Liu et al., 2023 - Google Patents

Efficient decentralized access control for secure data sharing in cloud computing

Liu et al., 2023

Document ID
9612923568803161937
Author
Liu T
Wu J
Li J
Li J
Li Y
Publication year
Publication venue
Concurrency and Computation: Practice and Experience

External Links

Snippet

Access control is an important technique in information security that allows legitimate users to gain access to and prevent unauthorized users from getting access to resources in a system. The restriction between access from a user and a shared file of the data owner can …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Li et al. Blockchain-based public auditing for big data in cloud storage
Lu et al. A blockchain-based privacy-preserving authentication scheme for VANETs
Xue et al. Combining data owner-side and cloud-side access control for encrypted cloud storage
Das et al. MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure
Zhu et al. The attack on Mona: Secure multi-owner data sharing for dynamic groups in the cloud
Li et al. A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors
Liu et al. Efficient decentralized access control for secure data sharing in cloud computing
Da Costa et al. Sec-Health: A blockchain-based protocol for securing health records
Li et al. A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data
Tu et al. A secure, efficient and verifiable multimedia data sharing scheme in fog networking system
Almasian et al. Secure cloud file sharing scheme using blockchain and attribute-based encryption
Tiwari et al. ACDAS: Authenticated controlled data access and sharing scheme for cloud storage
Liang et al. Towards blockchain empowered trusted and accountable data sharing and collaboration in mobile healthcare applications
Abo‐alian et al. Integrity as a service for replicated data on the cloud
Qiao et al. An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET
Srivastava et al. Attack resistant blockchain-based healthcare record system using modified RSA Algorithm
Lyu et al. A2UA: An auditable anonymous user authentication protocol based on blockchain for cloud services
Zhang et al. Data security in cloud storage
Wei et al. Dynamic data integrity auditing for secure outsourcing in the cloud
Zhou et al. A Scalable Blockchain‐Based Integrity Verification Scheme
Tang et al. Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack
Ma et al. SPMAC: Secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage
Tiwari et al. A novel secure cloud storage architecture combining proof of retrievability and revocation
Kaaniche et al. Id-based user-centric data usage auditing scheme for distributed environments
Havanje et al. Secure and reliable data access control mechanism in multi-cloud environment with inter-server communication security