

A New Method for Handling Time-Sensitive Information
Abstract
Since cloud storage first emerged, privacy and confidentiality of data stored in public clouds have been major concerns. Different advances have been utilized to safeguard the information in the cloud. It is an issue comparable to distributed storage. It liberates data proprietors since he has no liability of giving data to any normal clients. Thus the requirement for steady reconnaissance and consistent security rehearses. To protect the uprightness of the information, specialists have proposed different strategies to guarantee information security. In any case, there have been no plans to strengthen fine-grained control and possible control up until this point. Client and author (the "evil dictator") cannot access the data in this project without the client's use of a secret key. Here, a new feature in which data users can be granted access by a technical backup account is highlighted. For the purpose of storing private electronic data, the CPABE policy has been modified.
References
Wan, Z., & Deng, R. H. (2011). HASBE: A hierarchical attribute- based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security, 7(2), 743-754.
Yang K., Jia X., Ren X., Zhang B., Xie, R.(2013). DACMACS: Effective data access control for multi-authority cloud storage systems. Transactions on Information Forensics and Security,8(2),1790–1801.
Bertino, E., Bonatti, P. A., & Ferrari, E. (2001). TRBAC: A temporal role- based access control model. ACM Transactions on Information and System Security (TISSEC), 4(3), 191-
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2012). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.
Zhou, Z., Zhang, H., Zhang, Q., Xu, Y., & Li, P. (2014, December). Privacy-preserving granular data retrieval indexes for outsourced cloud data. In 2014 IEEE Global Communications Conference (pp. 601-606). IEEE.
Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2011, December). Reliable re- encryption in unreliable clouds. In 2011 IEEE Global Telecommunications Conference- GLOBECOM 2011 (pp. 1-5). IEEE.
Bethencourt, J., Sahai, A., & Waters, B. (2007, May). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321-334). IEEE.
Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213-229). Springer, Berlin, Heidelberg.
Yuan, K., Liu, Z., Jia, C., Yang, J., & Lv, S. (2013, September). Public key timed-release searchable encryption. In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (pp. 241- 248). IEEE.
Liu, Q., Wang, G., & Wu, J. (2014). Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information sciences, 258, 355-370.
Refbacks
- There are currently no refbacks.