Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications
نویسندگان
چکیده
منابع مشابه
Observation-based Fine Grained Access Control of Data
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where data are made accessible at various levels of abstractions according to their sensitivity levels. In this setting, unauthorized users are not able to infer the exact content of the confidential data, while they are allowed to get partial information out of it, according to their access rights. The...
متن کاملFine-Grained Access Control for RDF Data on Mobile Devices
Existing approaches for fine-grained access control for RDF data suffer from high overhead, making them ill-suited for mobile devices. This makes it difficult to develop mobile applications that manage personal RDF data in a privacy preserving manner. In this paper we propose a new approach to realise fine-grained access control for mobile devices. We show how fine-grained privacy settings for ...
متن کاملCloud Storage with Improved Access Control and Assured Deletion
Providing secure and efficient access to large scale outsourced data is an important issue of cloud computing. In this paper, a mechanism FADE, a secure overlay cloud storage system, which will guarantee assured file deletion and improved access control for outsourced data is proposed. Cryptographic approach is used for storing and managing data..
متن کاملOn Fine-Grained Access Control for XML
Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is efficient, secure evaluation of XPath expressions. We present a technique that secures path expressions by means of query modification, and we show that the query modification alg...
متن کاملFine-grained Access Control for Mobile Platforms
With the introduction of the smartphone, mobile phones have gone from closed systems with limited capability to mobile software platforms with rich software ecosystems. The same operating systems are now present in other mobile devices as well, such as tablets. The security mechanism of such software platforms have, apart from end-user requirements, heavily been influenced by business and legis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Industrial Informatics
سال: 2018
ISSN: 1551-3203,1941-0050
DOI: 10.1109/tii.2018.2841047