Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
An Efficient And Expressive Ciphertext-Policy Attribute-Based Encryption Scheme With Partially Hidden Access Structures, Revisited, Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal
An Efficient And Expressive Ciphertext-Policy Attribute-Based Encryption Scheme With Partially Hidden Access Structures, Revisited, Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal
Research Collection School Of Computing and Information Systems
Ciphertext-policy attribute-based encryption (CP-ABE) has been regarded as one of the promising solutions to protect data security and privacy in cloud storage services. In a CP-ABE scheme, an access structure is included in the ciphertext, which, however, may leak sensitive information about the underlying plaintext and the privileged recipients in that anyone who sees the ciphertext is able to learn the attributes of the privileged recipients from the associated access structure. In order to address this issue, CP-ABE with partially hidden access structures was introduced where each attribute is divided into an attribute name and an attribute value and the …
An Efficient And Expressive Ciphertext-Policy Attribute-Based Encryption Scheme With Partially Hidden Access Structures, Revisited, Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal
An Efficient And Expressive Ciphertext-Policy Attribute-Based Encryption Scheme With Partially Hidden Access Structures, Revisited, Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal
Research Collection School Of Computing and Information Systems
Ciphertext-policy attribute-based encryption (CP-ABE) has been regarded as one of the promising solutions to protect data security and privacy in cloud storage services. In a CP-ABE scheme, an access structure is included in the ciphertext, which, however, may leak sensitive information about the underlying plaintext and the privileged recipients in that anyone who sees the ciphertext is able to learn the attributes of the privileged recipients from the associated access structure. In order to address this issue, CP-ABE with partially hidden access structures was introduced where each attribute is divided into an attribute name and an attribute value and the …
Vmkdo: Verifiable Multi-Keyword Search Over Encrypted Cloud Data For Dynamic Data-Owner, Yibin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Limin Shen, Fushan Wei
Vmkdo: Verifiable Multi-Keyword Search Over Encrypted Cloud Data For Dynamic Data-Owner, Yibin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Limin Shen, Fushan Wei
Research Collection School Of Computing and Information Systems
The advantages of cloud computing encourage individuals and enterprises to outsource their local data storage and computation to cloud server, however, data security and privacy concerns seriously hinder the practicability of cloud storage. Although searchable encryption (SE) technique enables cloud server to provide fundamental encrypted data retrieval services for data-owners, equipping with a result verification mechanism is still of prime importance in practice as semi-trusted cloud server may return incorrect search results. Besides, single keyword search inevitably incurs many irrelevant results which result in waste of bandwidth and computation resources. In this paper, we are among the first to tackle …
Secure Fine-Grained Access Control And Data Sharing For Dynamic Groups In The Cloud, Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng
Secure Fine-Grained Access Control And Data Sharing For Dynamic Groups In The Cloud, Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng
Research Collection School Of Computing and Information Systems
Cloud computing is an emerging computing paradigm that enables users to store their data in a cloud server to enjoy scalable and on-demand services. Nevertheless, it also brings many security issues, since cloud service providers (CSPs) are not in the same trusted domain as users. To protect data privacy against untrusted CSPs, existing solutions apply cryptographic methods (e.g., encryption mechanisms) and provide decryption keys only to authorized users. However, sharing cloud data among authorized users at a fine-grained level is still a challenging issue, especially when dealing with dynamic user groups. In this paper, we propose a secure and efficient …
Attribute-Based Cloud Storage With Secure Provenance Over Encrypted Data, Hui Cui, Robert H. Deng, Yingjiu Li
Attribute-Based Cloud Storage With Secure Provenance Over Encrypted Data, Hui Cui, Robert H. Deng, Yingjiu Li
Research Collection School Of Computing and Information Systems
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access the encrypted data, enables dynamic user management such that the total number of data users is unbounded and user revocation can be carried out conveniently, supports data provider anonymity and traceability such that a data provider’s identity is not disclosed to data users in normal circumstances but can be traced by a trusted authority if …