Access Control: Ciphertext Policy - Attribute Based Encryption in Cloud Computing
Access control and confidentiality is important features for cloud storage. The cloud service allows data owner to outsource their data to the cloud and through which provide the data access to the users. Although cloud computing brings many benefits, it may suffer from conventional distributed syst...
Published in: | Journal of Physics: Conference Series |
---|---|
Main Author: | Muhammad N.; Mohd Zain J. |
Format: | Conference paper |
Language: | English |
Published: |
IOP Publishing Ltd
2021
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105362757&doi=10.1088%2f1742-6596%2f1830%2f1%2f012019&partnerID=40&md5=03aa12e691b5b10a21b883243d9ecb56 |
Similar Items
-
Observing access control policies using scrabble games
by: Ahmad S.; Abidin S.Z.Z.; Omar N.; Reiff-Marganiec S.
Published: (2014) -
Managing access control policy from end user perspective in collaborative environment
by: Ahmad S.; Abidin S.Z.Z.; Omar N.; Reiff-Marganiec S.
Published: (2014) -
Hybrid encryption based on a generative adversarial network
by: Amir I.; Suhaimi H.; Mohamad R.; Abdullah E.; Pu C.-H.
Published: (2024) -
Overview of homomorphic encryption technology for data privacy
by: Chen Q.; Li H.; Ariffin S.; Abdullah N.A.S.
Published: (2024) -
Authenticated Encryption Schemes: A Systematic Review
by: Jimale M.A.; Z'Aba M.R.; Kiah M.L.B.M.; Idris M.Y.I.; Jamil N.; Mohamad M.S.; Rohmad M.S.
Published: (2022)