[go: up one dir, main page]

Wise et al., 2015 - Google Patents

Cloud docs: Secure scalable document sharing on public clouds

Wise et al., 2015

View PDF
Document ID
3317577047486727187
Author
Wise C
Friedrich C
Nepal S
Chen S
Sinnott R
Publication year
Publication venue
2015 IEEE 8th International Conference on Cloud Computing

External Links

Snippet

Secure cloud storage solutions such as Trust Store, Sec Cloud, HPI Secure, and Twin Cloud have primarily focused on securing persistent data while storing it in public cloud services. Though data sharing has been recognized as an important security feature, these storage …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Yan et al. Heterogeneous data storage management with deduplication in cloud computing
Zhao et al. Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
Tang et al. Secure overlay cloud storage with access control and assured deletion
CN117396869B (en) Systems and methods for secure key management using distributed ledger technology
US9209972B2 (en) Mediator device monitoring and controlling access to electronic content
CN110099043A (en) The hiding more authorization center access control methods of support policy, cloud storage system
CN114065265A (en) Fine-grained cloud storage access control method, system and equipment based on block chain technology
US20100095118A1 (en) Cryptographic key management system facilitating secure access of data portions to corresponding groups of users
CN102687132A (en) Trusted Extensible Markup Language for Trusted Computing and Data Services
Namasudra et al. Secure and efficient data access control in cloud computing environment: a survey
JP2012518330A (en) Reliable cloud computing and cloud service framework
JP2012518329A (en) A framework for trusted cloud computing and services
Wise et al. Cloud docs: Secure scalable document sharing on public clouds
Zheng et al. Toward assured data deletion in cloud storage
Routray et al. Privacy preserving spatio-temporal attribute-based encryption for cloud applications
US9219715B2 (en) Mediator utilizing electronic content to enforce policies to a resource
Chandar et al. Hierarchical attribute based proxy re-encryption access control in cloud computing
JP7465043B2 (en) Method and apparatus for purpose-specific access control based on data encryption - Patents.com
Kuehner et al. Decentralized secure data sharing with attribute-based encryption: A resource consumption analysis
Gajmal et al. Original Research Article Access control and data sharing mechanism in decentralized cloud using blockchain technology
Nepal et al. Key management service: Enabling secure sharing and deleting of documents on public clouds
Zeidler et al. Towards a framework for privacy-preserving data sharing in portable clouds
Praneetha et al. Identity-based privacy-preserving anonymous authentication access control for secure cloud computing
US12445265B2 (en) Systems and methods for secure key management using distributed ledger technology
Bacis et al. Protecting resources and regulating access in cloud-based object storage