Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "2f1c9fe9-c17f-4ac2-9848-733f0f145cf2"}, "_deposit": {"created_by": 45, "id": "6293", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "6293"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/6293", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "There are a lot of data exchanges among the parties by\nusing cloud computing. So data protection is very\nimportant in cloud security environment. Especially, data\nprotection is needed for all organization by security\nservices against unauthorized accesses. There are many\nsecurity mechanisms for data protection. Attributes-based\nEncryption (ABE) is a one-to-many encryption to encrypt\nand decrypt data based on user attributes in which the\nsecret key of a user and the ciphertext are dependent\nupon attributes. Ciphertext policy attributes-based\nencryption (CP-ABE), an improvement of ABE schemes\nperforms an access control of security mechanisms for\ncloud storage. In this paper, sensitive parts of personal\nhealth records (PHRs) are encrypted by ABE with the\nhelp of CP-ABE. Moreover, an attributes-based policy\nrevocation case is considered as well as user revocation\nand it needs to generate a new secret key. In proposed\npolicy revocation case, PHRs owner changes attributes\npolicy to update available user lists. A trusted authority\n(TA) is used to issue secret keys as a third party. This\npaper emphasizes on key management and it also\nimproves attributes policy management and user\nrevocation. Proposed scheme provides a full control on\ndata owner as much as he changes policy. It supports a\nflexible policy revocation in CP-ABE and it saves time\nconsuming by comparing with traditional CP-ABE."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Attributes-based encryption (ABE)"}, {"interim": "Ciphertext policy attributes-based encryption (CP-ABE)"}, {"interim": "Personal Health Records (PHRs)"}, {"interim": "Trusted Authority (TA)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-11-19"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation.pdf", "filesize": [{"value": "1.5 Mb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensefree": "© 2018 ICAIT", "licensetype": "license_free", "mimetype": "application/pdf", "size": 1500000.0, "url": {"url": "https://meral.edu.mm/record/6293/files/A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation.pdf"}, "version_id": "dda3786e-a866-409d-816b-634e5dc74a5e"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICAIT-2018", "subitem_c_date": "1-2 November, 2018", "subitem_conference_title": "2nd International Conference on Advanced Information Technologies", "subitem_place": "Yangon, Myanmar", "subitem_session": "Cloud and Distributed Computing", "subitem_website": "https://www.uit.edu.mm/icait-2018/"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Phyo Wah Wah Myint"}, {"subitem_authors_fullname": "Swe Zin Hlaing"}, {"subitem_authors_fullname": "Ei Chaw Htoon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2018-11-02"}, "item_title": "A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation", "item_type_id": "21", "owner": "45", "path": ["1605779935331"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000006293", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-11-19"}, "publish_date": "2020-11-19", "publish_status": "0", "recid": "6293", "relation": {}, "relation_version_is_last": true, "title": ["A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation"], "weko_shared_id": -1}
  1. University of Information Technology
  2. International Conference on Advanced Information Technologies

A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation

http://hdl.handle.net/20.500.12678/0000006293
http://hdl.handle.net/20.500.12678/0000006293
0470d393-284a-4177-a48a-d579a7bead9f
2f1c9fe9-c17f-4ac2-9848-733f0f145cf2
None
Preview
Name / File License Actions
A A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation.pdf (1.5 Mb)
© 2018 ICAIT
Publication type
Conference paper
Upload type
Publication
Title
Title A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation
Language en
Publication date 2018-11-02
Authors
Phyo Wah Wah Myint
Swe Zin Hlaing
Ei Chaw Htoon
Description
There are a lot of data exchanges among the parties by
using cloud computing. So data protection is very
important in cloud security environment. Especially, data
protection is needed for all organization by security
services against unauthorized accesses. There are many
security mechanisms for data protection. Attributes-based
Encryption (ABE) is a one-to-many encryption to encrypt
and decrypt data based on user attributes in which the
secret key of a user and the ciphertext are dependent
upon attributes. Ciphertext policy attributes-based
encryption (CP-ABE), an improvement of ABE schemes
performs an access control of security mechanisms for
cloud storage. In this paper, sensitive parts of personal
health records (PHRs) are encrypted by ABE with the
help of CP-ABE. Moreover, an attributes-based policy
revocation case is considered as well as user revocation
and it needs to generate a new secret key. In proposed
policy revocation case, PHRs owner changes attributes
policy to update available user lists. A trusted authority
(TA) is used to issue secret keys as a third party. This
paper emphasizes on key management and it also
improves attributes policy management and user
revocation. Proposed scheme provides a full control on
data owner as much as he changes policy. It supports a
flexible policy revocation in CP-ABE and it saves time
consuming by comparing with traditional CP-ABE.
Keywords
Attributes-based encryption (ABE), Ciphertext policy attributes-based encryption (CP-ABE), Personal Health Records (PHRs), Trusted Authority (TA)
Conference papers
ICAIT-2018
1-2 November, 2018
2nd International Conference on Advanced Information Technologies
Yangon, Myanmar
Cloud and Distributed Computing
https://www.uit.edu.mm/icait-2018/
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-11-19 16:53:33.558309
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL