Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted dat...
| Main Authors: | Mohd Satar, Siti Dhalila, Hussin, Masnida, Mohd Hanapi, Zurina, Mohamed, Mohamad Afendee |
|---|---|
| Format: | Article |
| Published: |
Multidisciplinary Digital Publishing Institute
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/93402/ |
Similar Items
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
by: Salam, M., et al.
Published: (2015)
by: Salam, M., et al.
Published: (2015)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Adaptive multi-tenancy policy for enhancing service level agreement through resource allocation in cloud computing
by: Hussin, Masnida, et al.
Published: (2016)
by: Hussin, Masnida, et al.
Published: (2016)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Squaring the Virtuous Circle: Exploring the Potential of the 'Five Cs'
by: Butcher, John
Published: (2015)
by: Butcher, John
Published: (2015)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Conceptual frameworks for understanding the relationship between virtuous teaching and assessment
by: Keller, Mary Jean
Published: (2014)
by: Keller, Mary Jean
Published: (2014)
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
by: Jamal, Fara, et al.
Published: (2019)
by: Jamal, Fara, et al.
Published: (2019)
Implementing healthy planning and active living initiatives: a virtuous cycle
by: McCosker, A., et al.
Published: (2018)
by: McCosker, A., et al.
Published: (2018)
The contents of a virtuous upbringing based on the application of Luqman al-Hakim
by: Mamat , Arifin
Published: (2008)
by: Mamat , Arifin
Published: (2008)
On becoming virtuous: A life examined through the prism of Aristotle and Aquinas
by: Francis, Prudence Mary
Published: (2013)
by: Francis, Prudence Mary
Published: (2013)
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
by: Hassan Disina, Abdulkadir, et al.
Published: (2018)
by: Hassan Disina, Abdulkadir, et al.
Published: (2018)
From brand congruence to the ‘virtuous circle’: branding and the commercialization of public service broadcasting
by: Johnson, Catherine
Published: (2013)
by: Johnson, Catherine
Published: (2013)
The Role of a Lived Calling in Driving the Leadership Accomplishment of a Virtuous Purpose
by: Duperouzel, Lindsay Christian
Published: (2016)
by: Duperouzel, Lindsay Christian
Published: (2016)
Message based random variable length key encryption algorithm.
by: Mirvaziri, Hamid, et al.
Published: (2009)
by: Mirvaziri, Hamid, et al.
Published: (2009)
Open access to scholarly communications: advantages, policy and advocacy
by: FURNIVAL, Ariadne Chloe
Published: (2010)
by: FURNIVAL, Ariadne Chloe
Published: (2010)
Evaluating the impact of open access policies on research institutions
by: Huang, Karl, et al.
Published: (2020)
by: Huang, Karl, et al.
Published: (2020)
Compliance with the first funder open access policy in Australia
by: Kirkman, Noreen, et al.
Published: (2020)
by: Kirkman, Noreen, et al.
Published: (2020)
Using New Accessibility Tools to Guide Policy Innovation
by: Curtis, Carey, et al.
Published: (2013)
by: Curtis, Carey, et al.
Published: (2013)
Infrastructure accessibility in Nigerian campuses: evidence for policy and practice
by: Abubakar, Ahmed, et al.
Published: (2015)
by: Abubakar, Ahmed, et al.
Published: (2015)
Information hiding using steganography
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
The role of global health partnerships in shaping policy practices on access to medication in Cameroon: theory, models and policy practices
by: Ngoasong, Michael Zisuh.
Published: (2010)
by: Ngoasong, Michael Zisuh.
Published: (2010)
Improve cloud computing security using RSA encryption with Fermat's little theorem
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Encrypted quick response scheme for hotel check-in and access control system
by: Cheong, S., et al.
Published: (2017)
by: Cheong, S., et al.
Published: (2017)
The relationship between CSR and CFP: the lag effect, virtuous circle, and non-linear relationship in this linkage
by: Liu, Honglin
Published: (2018)
by: Liu, Honglin
Published: (2018)
Nego-feminism as a bridge between patriarchy and matriarchy in Zaynab Alkali's The Stillborn and The Virtuous Woman
by: Muhammad, Usman Ambu, et al.
Published: (2017)
by: Muhammad, Usman Ambu, et al.
Published: (2017)
Enhanced Cloud Service Broker Selection Policy Based On Differential Evolution Algorithm
by: Sanjalawe, Yousef Khader Khattar
Published: (2020)
by: Sanjalawe, Yousef Khader Khattar
Published: (2020)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Data Hiding Techniques In Digital Images
by: Al Thloothi, Salah Ramadan
Published: (2003)
by: Al Thloothi, Salah Ramadan
Published: (2003)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Similar Items
-
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023) -
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021) -
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020) -
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021) -
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)