Ditu et al., 2025 - Google Patents
Work-in-Progress: Optimizing Performance of User Revocation in Cryptographic Access Control with Trusted Execution EnvironmentsDitu et al., 2025
View PDF- Document ID
- 10260990433740411508
- Author
- Ditu I
- Berlato S
- Busi M
- Carbone R
- Ranise S
- Publication year
- Publication venue
- 2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
External Links
Snippet
The possibility (and convenience) of storing and sharing data through the cloud entails a set of concerns to data security, such as the presence of external attackers, malicious insiders, and honest-but-curious cloud providers. Cryptographic Access Control (CAC) addresses …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11436345B2 (en) | Protection of secret client data in a multiple client data deduplication environment | |
| US10339339B2 (en) | Securely storing and distributing sensitive data in a cloud-based application | |
| Contiu et al. | Anonymous and confidential file sharing over untrusted clouds | |
| Vegesna | Investigations on different security techniques for data protection in cloud computing using cryptography schemes | |
| Drucker et al. | Combining homomorphic encryption with trusted execution environment: a demonstration with paillier encryption and SGX | |
| Thilakarathne et al. | Improved hierarchical role based access control model for cloud computing | |
| Junghanns et al. | Engineering of secure multi-cloud storage | |
| Hedabou | Cryptography for addressing cloud computing security, privacy, and trust issues | |
| Zhang et al. | Tenant-led ciphertext information flow control for cloud virtual machines | |
| Martseniuk et al. | Universal centralized secret data management for automated public cloud provisioning | |
| CN115935390A (en) | Attribute-based method for controlling and encrypting dynamic access to files in secure sandbox | |
| Wei et al. | Aacs: A secure attribute based data access control for cloud-aided internet of vehicles using sgx | |
| Xu et al. | Security theories and practices for big data | |
| Raghuwanshi et al. | MS2: Practical data privacy and security framework for data at rest in cloud | |
| US20240070309A1 (en) | System and method for efficient cryptographically-assured data access management for advanced data access policies | |
| Dixit et al. | Identity and Access Control Techniques for Enhanced Data Communication in Cloud | |
| Thilakarathne et al. | Improved hierarchical role based access control model for cloud | |
| Pearson et al. | Securing information transfer in distributed computing environments | |
| Mythili et al. | Enhancing Role Based Access Control with Privacy in Cloud Computing. | |
| Ditu et al. | Work-in-Progress: Optimizing Performance of User Revocation in Cryptographic Access Control with Trusted Execution Environments | |
| He et al. | EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave | |
| Senthilkumar et al. | HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud | |
| Priya et al. | A survey: attribute based encryption for secure cloud | |
| Ren et al. | Limited Times of Data Access Based on SGX in Cloud Storage | |
| Zhang et al. | Improved CP-ABE Algorithm Based on Identity and Access Control |