Security

Amending Protection and Efficiency in Information Sharing

Download Now Free registration required

Executive Summary

With the high data sharing options there have been increasing demands and concerns for distributed data security; enforcement of access policies is one of the challenging issues. Cipher text policy attribute-based encryption is becoming a promising cryptographic solution to this issue. It enables data owners to define their own policies over user attributes distributed. The advantage comes with a major drawback which is known as a key escrow problem. This is not suitable for data sharing scenarios where the data owner would like to make their private data only accessible to designated users.

  • Format: PDF
  • Size: 732.15 KB