Secure Data Sharing with Fast Access Revocation through Untrusted Clouds.
Katarzyna KapustaHan QiuGérard MemmiPublished in: NTMS (2019)
Keyphrases
- data sharing
- sensitive data
- access control
- data privacy
- homomorphic encryption
- data access
- distributed data
- data integration
- data providers
- encryption scheme
- peer to peer
- information sharing
- privacy protection
- private data
- key management
- privacy preserving
- key distribution
- semantic interoperability
- government agencies
- security policies
- third party
- cloud computing
- data sources
- data sets
- public key cryptography
- databases
- data hiding
- data storage
- security analysis
- database systems