English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90069/105176 (86%)
Visitors : 6417032      Online Users : 187
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/25385


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/25385


    Title: A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments
    Authors: Chu, Pei-Shan;Lee, Cheng-Chi;Chu, Pei-Shan;Chung, Pei-Shan;黃明祥;Hwang, Min-Shiang
    Contributors: 資訊工程學系
    Keywords: Cloud computing;attribute-based encryption;access control;fine-grained access;revocation
    Date: 2013-07
    Issue Date: 2013-07-11 14:19:31 (UTC+8)
    Abstract: In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attributes have been ex-ploited to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the access structure on the user's private key, and the ciphertext-policy is the access structure on the ciphertext. And the access structure can also be categorized as either monotonic or non-monotonic one. Using ABE schemes can have the advantages: (1) to reduce the communication overhead of the Internet, and (2) to provide a ¯ne-grained access control. In this paper, we survey a basic attribute-based encryption scheme, two various access policy attribute-based encryption schemes, and two various access structures, which are analyzed for cloud environments. Finally, we list the comparisons of these schemes by some criteria for cloud environments.
    Relation: International Journal of Network Security,15(4):231-240.
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML559View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback