{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:29:58Z","timestamp":1752460198450},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319082"},{"type":"electronic","value":"9783642319099"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31909-9_4","type":"book-chapter","created":{"date-parts":[[2012,9,22]],"date-time":"2012-09-22T07:23:23Z","timestamp":1348298603000},"page":"59-76","source":"Crossref","is-referenced-by-count":28,"title":["K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access"],"prefix":"10.1007","author":[{"given":"Saman","family":"Zarandioon","sequence":"first","affiliation":[]},{"given":"Danfeng","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Vinod","family":"Ganapathy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"104th United States Congress. Health Insurance Portability and Accountability Act of 1996 (HIPPA), \n                    \n                      http:\/\/aspe.hhs.gov\/admnsimp\/pl104191.html"},{"key":"4_CR2","unstructured":"Amazon S3, \n                    \n                      http:\/\/aws.amazon.com\/s3\/"},{"key":"4_CR3","unstructured":"Amazon SimpleDB, \n                    \n                      http:\/\/aws.amazon.com\/simpledb\/"},{"key":"4_CR4","unstructured":"BIHE, \n                    \n                      http:\/\/bihe.org\/"},{"key":"4_CR5","unstructured":"Google App Engine, \n                    \n                      http:\/\/appengine.google.com"},{"key":"4_CR6","unstructured":"HIBE Crypto Library, \n                    \n                      https:\/\/sourceforge.net\/projects\/hibe"},{"key":"4_CR7","unstructured":"K2C Framework, \n                    \n                      https:\/\/sourceforge.net\/projects\/key2cloud\/"},{"key":"4_CR8","unstructured":"KP-ABE Crypto Library, \n                    \n                      https:\/\/sourceforge.net\/projects\/kpabe\n                    \n                    \n                  ."},{"key":"4_CR9","unstructured":"Open Source Implementation of CP-ABE, \n                    \n                      http:\/\/acsc.cs.utexas.edu\/cpabe\/"},{"key":"4_CR10","unstructured":"SQL Data Services\/Azure Services Platform, \n                    \n                      http:\/\/www.microsoft.com\/azure\/data.mspx"},{"key":"4_CR11","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS, pp. 29\u201343 (2005)"},{"key":"4_CR12","first-page":"327","volume-title":"Research Report RZ 3627, IBM Research","author":"M. Backes","year":"2005","unstructured":"Backes, M., Cachin, C., Oprea, A.: Secure Key-Updating for Lazy Revocation. In: Research Report RZ 3627, IBM Research, pp. 327\u2013346. Springer, Heidelberg (2005)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993, pp. 62\u201373. ACM (1993)","DOI":"10.1145\/168588.168596"},{"key":"4_CR14","first-page":"321","volume-title":"Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007","author":"J. Bethencourt","year":"2007","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334. IEEE Computer Society, Washington, DC (2007)"},{"key":"4_CR15","unstructured":"Blanton, M.: Key Management in Hierarchical Access Control Systems, 2007. PhD Thesis, Purdue University (August 2007)"},{"key":"4_CR16","unstructured":"Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and Efficient Key Management for Access Hierarchies. In: Proceedings of the ACM Conference on Computer and Communications Security (2005)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 127\u2013144. Springer, Heidelberg (1998)"},{"key":"4_CR18","unstructured":"Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: A distributed storage system for structured data. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, vol.\u00a07, pp. 205\u2013218 (2006)"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1655008.1655020","volume-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009","author":"R. Chow","year":"2009","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 85\u201390. ACM, New York (2009)"},{"key":"4_CR20","unstructured":"Fu, K.: Group sharing and random access in cryptographic storage file systems. Technical report, Masters thesis, MIT (1999)"},{"key":"4_CR21","unstructured":"Fu, K., Kamara, S., Kohno, T.: Key regression: Enabling efficient key distribution for secure distributed storage. In: NDSS (2006)"},{"key":"4_CR22","first-page":"89","volume-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006","author":"V. Goyal","year":"2006","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89\u201398. ACM, New York (2006)"},{"key":"4_CR23","first-page":"189","volume-title":"Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems","author":"D. Grolimund","year":"2006","unstructured":"Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. In: Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems, pp. 189\u2013198. IEEE Computer Society, Washington, DC (2006)"},{"key":"4_CR24","unstructured":"Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: NDSS, pp. 131\u2013145 (2003)"},{"key":"4_CR25","unstructured":"Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage (2003)"},{"key":"4_CR26","volume-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies, FAST 2002","author":"E. Riedel","year":"2002","unstructured":"Riedel, E., Kallahalla, M., Swaminathan, R.: A framework for evaluating storage system security. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies, FAST 2002. USENIX Association, Berkeley (2002)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Stanton, P., Yurcik, W., Brumbaugh, L.: Protecting multimedia data in storage: A survey of techniques emphasizing encryption. In: IS and T\/SPIE International Symposium Electronic Imaging\/Storage and Retrieval Methods and Applications for Multimedia, pp. 18\u201329 (2005)","DOI":"10.1117\/12.587207"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H. Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy\u00a08, 24\u201331 (2010)","journal-title":"IEEE Security and Privacy"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q. Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 355\u2013370. Springer, Heidelberg (2009)"},{"key":"4_CR30","series-title":"LNICST","first-page":"483","volume-title":"SecureComm 2011","author":"H. Xiong","year":"2012","unstructured":"Xiong, H., Zhang, X., Zhu, W., Yao, D.: CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. In: Rajarajan, M., et al. (eds.) SecureComm 2011. LNICST, vol.\u00a096, pp. 483\u2013492. Springer, Heidelberg (2012)"},{"key":"4_CR31","first-page":"534","volume-title":"Proceedings of the 29th Conference on Information Communications, INFOCOM 2010","author":"S. Yu","year":"2010","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 534\u2013542. IEEE Computer Society Press, Piscataway (2010)"},{"key":"4_CR32","unstructured":"Zarandioon, S., Yao, D., Ganapathy, V.: K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. Technical report, Rutgers University. DCS-tr-688"},{"key":"4_CR33","unstructured":"Zarandioon, S.: Zaranux, \n                    \n                      http:\/\/zaranux.com\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31909-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T12:38:51Z","timestamp":1557232731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31909-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319082","9783642319099"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31909-9_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}