Anomaly Detection in Cloud Computing
Abstract
[1] Yan Zhu, Guohua Gan, Ruiqi Guo, and Dijiang Huang, ”PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud”, IEEE Transaction on Cloud Computing,2016.
[2] Prince Jain, ”Security Issues and their Solution in Cloud Computing”, International Journal of Computing Business Research,2012
[3] Santosh Kumar and R. H. Goudar, “Cloud Computing Research Issues, Challenges, Architecture, Platforms and Applications: A Survey ”, International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.
[4] F. R. Institute, ”Personal data in the cloud: A global survey of consumer attitudes”, http://www.fujitsu.com/downloads/SOL/fai/reports/ fujitsu/personaldata-in-the cloud.pdf, 2010.
[5] Zhi Qiao, Shuwen Liang, Spencer Davis and Hai Jiang,” Survey of Attribute Based Encryption”, IEEE Conference,2014
[6] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ”Attribute-based encryption for fine-grained access control of encrypted data”, in ACM Conference on CCS,pp.8998,2006
[7] A. Fiat and M. Naor, ”Broadcast encryption”, in Advances in Cryptology (CRYPTO93), vol. 773 of LNCS. springer-verlag, pp. 480491,1994
[8] Zhen Liu, Zhenfu Cao, ” Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild”, IEEE Transaction on Information Forensics and Security, Vol. 10, N0. 1, January 2015
[9] Christian D.Peer, Dominik Engel, Stephen B.Wicker, “Hierarchical Key Management for multi-resolution Load Data Representation”, IEEE International Conference on Smart Grid Communications, 2014
[10] D. Boneh and B. Waters, ”A fully collusion resistant broadcast, trace, and revoke system”, in ACM Conference on Computer and Communications Security, pp. 211220,2006.
[11] David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn, “Role-Based Access Control (RBAC): Features and Motivations”
[12] H. Chung, J. Park, S. Lee, and C. Kang, ” Digital forensic investigation of cloud storage services”, Digital Investigation, vol. 9, no. 2, pp.
8195, 2012.
[13] Chen, S. Nyemba, and B. Malin, ”Detecting anomalous insiders in collaborative information systems”, Dependable and Secure Computing, IEEE Transactions on, vol. 9, no. 3, pp. 332344, May 2012
[14] M. Blanton and K. B. Frikken, ”Efficient Multi-dimensional key management in broadcast services”, in ESORICS, pp. 424 440,2010
[15] S. Garg, A. Kumarasubramanian, A. Sahai, and B. Waters, ”Building efficient fully collusion-resilient traitor tracing and revocation schemes”, in Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, pp.
121130,2010.
[16] M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, ”Dynamic and efficient key management for access hierarchies”, ACM Trans. Inf. Syst.
Secur., vol. 12, no. 3, 2009.
[17] N. Attrapadung and H. Imai, ”Conjunctive broadcast and attribute-based encryption”, in Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings,pp.248265,2009
[18] Y. Chung, H. Lee, F. Lai, and T. Chen, Access control in user hierarchy based on elliptic curve cryptosystem”, Information Sciences, vol. 178, pp. 230243,2008.
[19] E. Bertino, N. Shang, and S. Wagstaff, ”An efficient time-bound hierarchical key management scheme for secure broadcasting”, IEEE Trans. on Dependable and Secure Computing, vol. 5, no. 2, pp. 6570, 2008
[20] R. Ostrovsky, A. Sahai, and B.Waters, Attribute-based encryption with nonmonotonic access structures”, in ACM Conference on
Full Text:
PDFReferences
Yan Zhu, Guohua Gan, Ruiqi Guo, and Dijiang Huang, ”PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud”, IEEE Transaction on Cloud Computing,2016.
Prince Jain, ”Security Issues and their Solution in Cloud Computing”, International Journal of Computing Business Research,2012
Santosh Kumar and R. H. Goudar, “Cloud Computing Research Issues, Challenges, Architecture, Platforms and Applications: A Survey ”, International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.
F. R. Institute, ”Personal data in the cloud: A global survey of consumer attitudes”, http://www.fujitsu.com/downloads/SOL/fai/reports/ fujitsu/personaldata-in-the cloud.pdf, 2010.
Zhi Qiao, Shuwen Liang, Spencer Davis and Hai Jiang,” Survey of Attribute Based Encryption”, IEEE Conference,2014
V. Goyal, O. Pandey, A. Sahai, and B. Waters, ”Attribute-based encryption for fine-grained access control of encrypted data”, in ACM Conference on CCS,pp.8998,2006
A. Fiat and M. Naor, ”Broadcast encryption”, in Advances in Cryptology (CRYPTO93), vol. 773 of LNCS. springer-verlag, pp. 480491,1994
Zhen Liu, Zhenfu Cao, ” Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild”, IEEE Transaction on Information Forensics and Security, Vol. 10, N0. 1, January 2015
Christian D.Peer, Dominik Engel, Stephen B.Wicker, “Hierarchical Key Management for multi-resolution Load Data Representation”, IEEE International Conference on Smart Grid Communications, 2014
D. Boneh and B. Waters, ”A fully collusion resistant broadcast, trace, and revoke system”, in ACM Conference on Computer and Communications Security, pp. 211220,2006.
David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn, “Role-Based Access Control (RBAC): Features and Motivations”
H. Chung, J. Park, S. Lee, and C. Kang, ” Digital forensic investigation of cloud storage services”, Digital Investigation, vol. 9, no. 2, pp.
, 2012.
Chen, S. Nyemba, and B. Malin, ”Detecting anomalous insiders in collaborative information systems”, Dependable and Secure Computing, IEEE Transactions on, vol. 9, no. 3, pp. 332344, May 2012
M. Blanton and K. B. Frikken, ”Efficient Multi-dimensional key management in broadcast services”, in ESORICS, pp. 424 440,2010
S. Garg, A. Kumarasubramanian, A. Sahai, and B. Waters, ”Building efficient fully collusion-resilient traitor tracing and revocation schemes”, in Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, pp.
,2010.
M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, ”Dynamic and efficient key management for access hierarchies”, ACM Trans. Inf. Syst.
Secur., vol. 12, no. 3, 2009.
N. Attrapadung and H. Imai, ”Conjunctive broadcast and attribute-based encryption”, in Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings,pp.248265,2009
Y. Chung, H. Lee, F. Lai, and T. Chen, Access control in user hierarchy based on elliptic curve cryptosystem”, Information Sciences, vol. 178, pp. 230243,2008.
E. Bertino, N. Shang, and S. Wagstaff, ”An efficient time-bound hierarchical key management scheme for secure broadcasting”, IEEE Trans. on Dependable and Secure Computing, vol. 5, no. 2, pp. 6570, 2008
R. Ostrovsky, A. Sahai, and B.Waters, Attribute-based encryption with nonmonotonic access structures”, in ACM Conference onComputer and Communications Security, pp.
,2007.
J. Bethencourt, A. Sahai, and B. Waters, ”Ciphertext-policy attribute-based encryption”, in IEEE Symposium on Security and Privacy, pp. 321334,2007.
A. D. Santis, A. L. Ferrara, and B. Masucci, ”Efficient provably secure hierarchical key assignment schemes”, in MFCS, pp. 371382,2007.
D. Boneh, A. Sahai, and B. Waters, ”Fully collusion resistant traitor tracing with short cipher texts and private keys”, in EUROCRYPT, pp. 573592,2006
D. Boneh, X. Boyen, and E.-J. Goh, ”Hierarchical identity based encryption with constant size cipher text”, in Advances in Cryptology (EUROCRYPT2005), vol. 3494 of
LNCS, pp. 440456,2005.
H. Kim, B. Park1, J. Ha, B. Lee, and D. Park, ”New key management systems for multilevel security”, in ICCSA 2005, vol. 3481 of LNCS, pp. 245253,2005.
A. Sahai and B. Waters, ”Fuzzy identity-based encryption”, in EUROCRYPT, pp. 457473,2005
H. Chien, ”Efficient time-bound hierarchical key assignment scheme”, IEEE Trans. on
Knowledge and Data Engineering, vol. 16, no. 10, pp. 13011304, 2004.
N. Provos, M. Friedl, and P. Honeyman, ”Preventing privilege escalation”, in Proceedings of the 12thUSENIX Security Symposium,
Washington, D.C., USA, August 4-8, 2003, 2003.
W. Tzeng, ”A time-bound cryptographic key assignment scheme for access control in a hierarchy”, IEEE Trans. on Knowledge and Data Engineering, vol.14, no. 1, pp. 182188, 2002.
D. Boneh and M. K. Franklin, ”Identity-based encryption fromthe weil pairing”, in CRYPTO,pp. 213229,2001
Carlo Bellettini, Elisa Bertino, Elena Ferrari, ”, Information”RoleBasedAccessControlModels
Security Technical Report, Vol. 6, No. 2 21-9,2001
W.-G. Tzeng and Z.-J. Tzeng, ”A public-key traitor tracing scheme with revocation using dynamic shares”, in Public Key Cryptography, pp. 207224,2001
D. Boneh and M. K. Franklin, ”An efficient public key traitor tracing scheme”, in CRYPTO, 1999, pp. 338353.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology