Liu et al., 2023 - Google Patents
Efficient decentralized access control for secure data sharing in cloud computingLiu et al., 2023
- Document ID
- 9612923568803161937
- Author
- Liu T
- Wu J
- Li J
- Li J
- Li Y
- Publication year
- Publication venue
- Concurrency and Computation: Practice and Experience
External Links
Snippet
Access control is an important technique in information security that allows legitimate users to gain access to and prevent unauthorized users from getting access to resources in a system. The restriction between access from a user and a shared file of the data owner can …
- 238000000034 method 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Blockchain-based public auditing for big data in cloud storage | |
Lu et al. | A blockchain-based privacy-preserving authentication scheme for VANETs | |
Xue et al. | Combining data owner-side and cloud-side access control for encrypted cloud storage | |
Das et al. | MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure | |
Zhu et al. | The attack on Mona: Secure multi-owner data sharing for dynamic groups in the cloud | |
Li et al. | A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors | |
Liu et al. | Efficient decentralized access control for secure data sharing in cloud computing | |
Da Costa et al. | Sec-Health: A blockchain-based protocol for securing health records | |
Li et al. | A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data | |
Tu et al. | A secure, efficient and verifiable multimedia data sharing scheme in fog networking system | |
Almasian et al. | Secure cloud file sharing scheme using blockchain and attribute-based encryption | |
Tiwari et al. | ACDAS: Authenticated controlled data access and sharing scheme for cloud storage | |
Liang et al. | Towards blockchain empowered trusted and accountable data sharing and collaboration in mobile healthcare applications | |
Abo‐alian et al. | Integrity as a service for replicated data on the cloud | |
Qiao et al. | An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET | |
Srivastava et al. | Attack resistant blockchain-based healthcare record system using modified RSA Algorithm | |
Lyu et al. | A2UA: An auditable anonymous user authentication protocol based on blockchain for cloud services | |
Zhang et al. | Data security in cloud storage | |
Wei et al. | Dynamic data integrity auditing for secure outsourcing in the cloud | |
Zhou et al. | A Scalable Blockchain‐Based Integrity Verification Scheme | |
Tang et al. | Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack | |
Ma et al. | SPMAC: Secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage | |
Tiwari et al. | A novel secure cloud storage architecture combining proof of retrievability and revocation | |
Kaaniche et al. | Id-based user-centric data usage auditing scheme for distributed environments | |
Havanje et al. | Secure and reliable data access control mechanism in multi-cloud environment with inter-server communication security |