[go: up one dir, main page]

Ditu et al., 2025 - Google Patents

Work-in-Progress: Optimizing Performance of User Revocation in Cryptographic Access Control with Trusted Execution Environments

Ditu et al., 2025

View PDF
Document ID
10260990433740411508
Author
Ditu I
Berlato S
Busi M
Carbone R
Ranise S
Publication year
Publication venue
2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

External Links

Snippet

The possibility (and convenience) of storing and sharing data through the cloud entails a set of concerns to data security, such as the presence of external attackers, malicious insiders, and honest-but-curious cloud providers. Cryptographic Access Control (CAC) addresses …
Continue reading at iris.unive.it (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
US11436345B2 (en) Protection of secret client data in a multiple client data deduplication environment
US10339339B2 (en) Securely storing and distributing sensitive data in a cloud-based application
Contiu et al. Anonymous and confidential file sharing over untrusted clouds
Vegesna Investigations on different security techniques for data protection in cloud computing using cryptography schemes
Drucker et al. Combining homomorphic encryption with trusted execution environment: a demonstration with paillier encryption and SGX
Thilakarathne et al. Improved hierarchical role based access control model for cloud computing
Junghanns et al. Engineering of secure multi-cloud storage
Hedabou Cryptography for addressing cloud computing security, privacy, and trust issues
Zhang et al. Tenant-led ciphertext information flow control for cloud virtual machines
Martseniuk et al. Universal centralized secret data management for automated public cloud provisioning
CN115935390A (en) Attribute-based method for controlling and encrypting dynamic access to files in secure sandbox
Wei et al. Aacs: A secure attribute based data access control for cloud-aided internet of vehicles using sgx
Xu et al. Security theories and practices for big data
Raghuwanshi et al. MS2: Practical data privacy and security framework for data at rest in cloud
US20240070309A1 (en) System and method for efficient cryptographically-assured data access management for advanced data access policies
Dixit et al. Identity and Access Control Techniques for Enhanced Data Communication in Cloud
Thilakarathne et al. Improved hierarchical role based access control model for cloud
Pearson et al. Securing information transfer in distributed computing environments
Mythili et al. Enhancing Role Based Access Control with Privacy in Cloud Computing.
Ditu et al. Work-in-Progress: Optimizing Performance of User Revocation in Cryptographic Access Control with Trusted Execution Environments
He et al. EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave
Senthilkumar et al. HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud
Priya et al. A survey: attribute based encryption for secure cloud
Ren et al. Limited Times of Data Access Based on SGX in Cloud Storage
Zhang et al. Improved CP-ABE Algorithm Based on Identity and Access Control