Loading...
Search for: proxy-re-encryptions
0.005 seconds

    Missing a trusted reference monitor: How to enforce confidential and dynamic access policies?

    , Article Communications in Computer and Information Science ; Vol. 428, issue , Oct , 2014 , p. 92-104 ; ISSN: 18650929 ; ISBN: 978-3319109022 Karimi, L ; Javadi, S. A ; Hadavi, M. A ; Jalili1, R ; Sharif University of Technology
    Abstract
    Popularity of data outsourcing and its consequent access control issues such as dynamism and efficiency is the main motivation of this paper. Existing solutions suffer from the potential unlimited number of user keys, inefficient update of policies, and disclosure of data owner’s access control policies. Using Chinese remainder theorem and proxy re-encryption together, in this paper, we propose an efficient access control enforcement mechanism based on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory  

    An anonymous attribute-based access control system supporting access structure update

    , Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 85-91 ; 9781728143736 (ISBN) Chegenizadeh, M ; Ali, M ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    It is quite common nowadays for clients to outsource their personal data to a cloud service provider. However, it causes some new challenges in the area of data confidentiality and access control. Attribute-based encryption is a promising solution for providing confidentiality and fine-grained access control in a cloud-based cryptographic system. Moreover, in some cases, to preserve the privacy of clients and data, applying hidden access structures is required. Also, a data owner should be able to update his defined access structure at any time when he is online or not. As in several real-world application scenarios like e-health systems, the anonymity of recipients, and the possibility of...