Security

Amending Protection and Efficiency in Information Sharing

Free registration required

Executive Summary

With the high data sharing options there have been increasing demands and concerns for distributed data security; enforcement of access policies is one of the challenging issues. Cipher text policy attribute-based encryption is becoming a promising cryptographic solution to this issue. It enables data owners to define their own policies over user attributes distributed. The advantage comes with a major drawback which is known as a key escrow problem. This is not suitable for data sharing scenarios where the data owner would like to make their private data only accessible to designated users.

  • Format: PDF
  • Size: 732.15 KB