References
- H. Takabi, J. B. D. Joshi, and G. J. Ahn, "Security and privacy challenges in cloud computing environments," Security & Privacy, IEEE, vol. 8, pp.24-31, 2010. https://doi.org/10.1109/MSP.2010.186
- M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing," in Proc. of the 5th USENIX conference on Hot topics in security, pp.1-8, 2010. http://portal.acm.org/citation.cfm?id=1924934
- E. Bertino, F. Paci, R. Ferrini, and N. Shang, "Privacy-preserving digital identity management for cloud computing," Data Engineering, vol. 32, pp.21-27, 2009. http://sites.computer.org/debull/A09mar/A09MAR-CD.pdf#page=23
- S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp.1-11, 2011. https://doi.org/10.1016/j.jnca.2010.07.006
- S. Chow, Y. J. He, L. Hui, and S. Yiu, "SPICE: Simple privacy-preserving identity-management for cloud environment," in Proc. of Applied Cryptography and Network Security, pp.526-543, 2012.
- J. Chen, Y. Wang, and X. Wang, "On-demand security architecture for cloud computing," Computer, vol. 45, pp.73-78, 2012.
- D. Chaum, "Blind signatures for untraceable payments," in Proc. Of Crypto '82, pp.199-203, 1982.
- L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, pp.770-772, 1981. https://doi.org/10.1145/358790.358797
- M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," in Proc. of the RSLA '89, pp.233-271, 1989. http://rspa.royalsocietypublishing.org/content/426/1871/233.short
- X. Lin, and X. Li, "Achieving efficient cooperative message authentication in vehicular ad hoc networks," IEEE T. Vehicular Technology, vol.62, no.7, pp.3339-3348, 2013. https://doi.org/10.1109/TVT.2013.2257188
- R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications," IEEE Transactions on Parallel and Distributed Systems, vol.23, no.9, pp.1621-1631, 2012. https://doi.org/10.1109/TPDS.2012.86
- R. Lu, X. Lin, X. Liang, and X. Shen, "A dynamic privacy-preserving key management scheme for location-based services in VANETs," IEEE Transactions on Intelligent Transportation Systems, vol.13, no.1, pp.127-139, 2012. https://doi.org/10.1109/TITS.2011.2164068
- H. Zhu, T. Liu, and G. Wei, "PPAS: privacy protection authentication scheme for VANET," Cluster Computing, pp.1-14, 2013.
- P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, and L. B. Othmane, "An entity- centric approach for privacy and identity management in cloud computing," in Proc. of IEEE RDS '10, pp.177-183, 2010.
- J. Chen, G. Wu, L. Shen, and Z. Ji, "Differentiated security levels for personal identifiable information in identity management system," Expert Systems with Applications, vol.38, pp. 14156-14162, 2011.
- J. Chen, G. Wu, and Z. Ji, "Secure interoperation of identity managements among different circles of trust," Computer Standards & Interfaces, vol.33, pp.533-540, 2011. https://doi.org/10.1016/j.csi.2011.02.008
- H. Yang, H. Kim, H. Li, E. Yoon, X. Wang, and X. Ding, "An efficient broadcast authentication scheme with batch verification for ADS-B messages," KSII Transactions on Internet and Information Systems (TIIS), vol.7, no.10, pp.2544-2560, 2013. https://doi.org/10.3837/tiis.2013.10.013
- R. Ranchal, B. Bhargava, L. B. Othmane, L. Lilien, A. Kim, and M. Kang, "Protection of identity information in cloud computing without trusted third party," in Proc. IEEE RDS '10, pp. 368-372, 2010.
- C. T. Li, C. C. Lee, C. Y. Weng, and C. I. Fan, "An extended multi-server-based tenant authentication and key agreement scheme with tenant anonymity," KSII Transactions on Internet and Information Systems (TIIS), vol. 7, no.1, pp.119-131, 2013. https://doi.org/10.3837/tiis.2013.01.008
- J. Xiong, Z. Yao, and J. Ma, "Action-based multilevel access control for structured document," Journal of Computer Research and Development, vol.50, no.7, pp.1399-1408, 2013. http://d.wanfangdata.com.cn/periodical_jsjyjyfz201307005.aspx
- G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. of ACM CCS '10, pp.735-737, 2010.
- X. Liu, J. Ma, J. Xiong, and G. Liu, "Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data," International Journal of Network Security, vol.16, no.4, pp.351-357, 2014. http://ijns.femto.com.tw/contents/ijns-v16-n6/ijns-2014-v16-n6-p437-443.pdf
- X. Liu, J. Ma, and J. Xiong, "Ciphertext policy weighted attribute based encryption scheme," Journal of Xi'an Jiaotong University, vol.47, no.8, pp.44-48, 2013. http://d.wanfangdata.com.cn/periodical_xajtdxxb201308008.aspx
- F. Zhao, T. Nishide, and K. Sakurai, "Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems," in Proc. of ISPEC '11, pp.83-97, 2011.
- M. Nabeel, E. Bertino, and M. Kantarcioglu, "Towards privacy preserving access control in the cloud," in Proc. of CollaborateCom '11, pp.172-180, 2011. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6144802
- S. C. Yu, C. Wang, K. Ren, and W. J. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of INFOCOM '10, pp.1-9, 2010.
- J. Kolter, R. Schillinger, and G. Pernul, "A privacy-enhanced attribute-based access control system," in Proc. of DAS XXI '07, pp.129-143, 2007.
- A. A. Almutairi, M. I. Sarfraz, S. Basalamah, W. G. Aref, and A. Ghafoor, "A distributed access control architecture for cloud computing," IEEE Software, vol.29, pp.36-44, 2012. https://doi.org/10.1109/MS.2011.153
- R. Lu, X. Lin, and X. Shen, "SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency," IEEE Transactions on Parallel and Distributed Systems, vol.24, no.3, pp.614-624, 2013. https://doi.org/10.1109/TPDS.2012.146
- X. Lin, R. Lu, X. Shen, Y. Nemoto and N. Kato, "SAGE: A strong privacy-preserving scheme against global eavesdropping for eHealth systems," IEEE Journal on Selected Areas in Communications, vol.27, no.4, pp.365-378, 2009. https://doi.org/10.1109/JSAC.2009.090502
- K. Ren, W. Lou, K. Kim, and R. Deng, "A novel privacy preserving authentication and access control scheme for pervasive computing environments," IEEE Transactions on Vehicular Technology, vol. 55, pp.1373-1384, 2006. https://doi.org/10.1109/TVT.2006.877704
- C. T. Li, M. S. Hwang, and Y. P. Chu, "Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments," Computer Communications, vol. 31, pp. 4255-4258, 2008. https://doi.org/10.1016/j.comcom.2008.06.002
- Z. Tan, "A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments," Journal of Network and Computer Applications, vol. 35, pp. 1839-1846, 2012. https://doi.org/10.1016/j.jnca.2012.07.008
- M. Ruckert, and D. Schroder, "Fair partially blind signatures," in Proc. of Africacrypt '10, pp. 34-51, 2010.
- S. Ruj, M. Stojmenovic, and A. Nayak, "Privacy preserving access control with authentication for securing data in clouds," in Proc. of IEEE/ACM CCGrid '12, pp.556-563, 2012.
- J. Li, M. H. Au, W. Susilo, D. Xie, and K. Ren, "Attribute-based signature and its applications," in Proc. of ACM ASIACCS '10, pp.60-69, 2010.
- J. Xiong, Z. Yao, and J. Ma, "PRAM: privacy preserving access management scheme in cloud services," in Proc. of ACM ASIACCS cloudcomputing '13, pp.41-46, 2013.
- R. C. Merkle, "One way hash functions and DES," in Proc. of CRYPTO '89, pp.428-446, 1990.
- Q. He, D. Wu, and P. Khosla, "The quest for personal control over mobile location privacy," IEEE Communications Magazine, vol.42, pp.130-136, 2004. https://doi.org/10.1109/MCOM.2004.1299356
- J. Xiong, Z. Yao, and J. Ma, "Multilevel access control model for video database," Journal on Communications, vol.33, no.8, pp.147-154, 2012. http://www.joconline.com.cn/ch/reader/view_abstract.aspx?file_no=20120818
- A. Weimerskirch and D. Westhoff, "Zero common-knowledge authentication for pervasive networks," in Proc. of ACM SAC '03, pp.73-87, 2003.
- S. Xu and M. Yung, "K-anonymous secret handshakes with reusable credentials," in Proc. of ACM CCS '04, pp.158-167, 2004.
Cited by
- Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings vol.8, pp.8, 2014, https://doi.org/10.3837/tiis.2014.08.022
- 의료정보 접근을 위한 동적상황인증시스템의 구현 vol.19, pp.6, 2014, https://doi.org/10.7472/jksii.2018.19.6.31
- Self-destruction of data in cloud using asymmetric key with key generator vol.37, pp.p2, 2014, https://doi.org/10.1016/j.matpr.2020.08.655