Loading [a11y]/accessibility-menu.js
Customized Authorization Process for Cloud Computing and IoT Using Attribute-Based Encryption | IEEE Conference Publication | IEEE Xplore

Customized Authorization Process for Cloud Computing and IoT Using Attribute-Based Encryption


Abstract:

Maintaining a complex access control over the encrypted data represents one of the most challenging processes of cloud computing and IoT (Internet-of-Things). In this pap...Show More

Abstract:

Maintaining a complex access control over the encrypted data represents one of the most challenging processes of cloud computing and IoT (Internet-of-Things). In this paper we will present and discuss a policy approach based on cipher-text policy and attribute-based encryption in such way that we are able to guarantee a high level of complexity for controlling the access over encrypted data, and by providing a personalized verifiable authorization process. This process and scheme will be noted as CCIoT -CP-ABE (Cloud Computing Internet-of-Things Cipher Policy-Attribute-Based Encryption). The main advantage of the proposed scheme is to provide data confidentiality for the encrypted data in case if the server has been compromised. The second advantage of the proposed scheme is that guarantees a high level of security against collusion attacks. The evaluation of the performance is presented as well.
Date of Conference: 30 June 2022 - 01 July 2022
Date Added to IEEE Xplore: 15 August 2022
ISBN Information:
Conference Location: Ploiesti, Romania

Contact IEEE to Subscribe

References

References is not available for this document.