{"created":"2020-11-19T16:50:23.269663+00:00","id":6293,"links":{},"metadata":{"_buckets":{"deposit":"2f1c9fe9-c17f-4ac2-9848-733f0f145cf2"},"_deposit":{"created_by":45,"id":"6293","owner":"45","owners":[45],"owners_ext":{"displayname":"","email":"dimennyaung@uit.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"6293"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/6293","sets":["1582963342780:1605779935331"]},"communities":["uit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"There are a lot of data exchanges among the parties by\nusing cloud computing. So data protection is very\nimportant in cloud security environment. Especially, data\nprotection is needed for all organization by security\nservices against unauthorized accesses. There are many\nsecurity mechanisms for data protection. Attributes-based\nEncryption (ABE) is a one-to-many encryption to encrypt\nand decrypt data based on user attributes in which the\nsecret key of a user and the ciphertext are dependent\nupon attributes. Ciphertext policy attributes-based\nencryption (CP-ABE), an improvement of ABE schemes\nperforms an access control of security mechanisms for\ncloud storage. In this paper, sensitive parts of personal\nhealth records (PHRs) are encrypted by ABE with the\nhelp of CP-ABE. Moreover, an attributes-based policy\nrevocation case is considered as well as user revocation\nand it needs to generate a new secret key. In proposed\npolicy revocation case, PHRs owner changes attributes\npolicy to update available user lists. A trusted authority\n(TA) is used to issue secret keys as a third party. This\npaper emphasizes on key management and it also\nimproves attributes policy management and user\nrevocation. Proposed scheme provides a full control on\ndata owner as much as he changes policy. It supports a\nflexible policy revocation in CP-ABE and it saves time\nconsuming by comparing with traditional CP-ABE."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Attributes-based encryption (ABE)"},{"interim":"Ciphertext policy attributes-based encryption (CP-ABE)"},{"interim":"Personal Health Records (PHRs)"},{"interim":"Trusted Authority (TA)"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-11-19"}],"displaytype":"preview","filename":"A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation.pdf","filesize":[{"value":"1.5 Mb"}],"format":"application/pdf","license_note":"© 2018 ICAIT","licensetype":"license_note","url":{"url":"https://meral.edu.mm/record/6293/files/A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation.pdf"},"version_id":"dda3786e-a866-409d-816b-634e5dc74a5e"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICAIT-2018","subitem_c_date":"1-2 November, 2018","subitem_conference_title":"2nd International Conference on Advanced Information Technologies","subitem_place":"Yangon, Myanmar","subitem_session":"Cloud and Distributed Computing","subitem_website":"https://www.uit.edu.mm/icait-2018/"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Phyo Wah Wah Myint"},{"subitem_authors_fullname":"Swe Zin Hlaing"},{"subitem_authors_fullname":"Ei Chaw Htoon"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2018-11-02"},"item_title":"A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation","item_type_id":"21","owner":"45","path":["1605779935331"],"publish_date":"2020-11-19","publish_status":"0","recid":"6293","relation_version_is_last":true,"title":["A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation"],"weko_creator_id":"45","weko_shared_id":-1},"updated":"2021-12-13T00:27:43.760460+00:00"}