{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:01:46Z","timestamp":1771614106804,"version":"3.50.1"},"reference-count":32,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["MGS"],"published-print":{"date-parts":[[2016,5,26]]},"DOI":"10.3233\/mgs-160244","type":"journal-article","created":{"date-parts":[[2016,5,31]],"date-time":"2016-05-31T12:09:10Z","timestamp":1464696550000},"page":"69-90","source":"Crossref","is-referenced-by-count":36,"title":["Secure and efficient data access control in cloud computing environment: A survey"],"prefix":"10.1177","volume":"12","author":[{"given":"Suyel","family":"Namasudra","sequence":"first","affiliation":[]},{"given":"Pinki","family":"Roy","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"issue":"4","key":"10.3233\/MGS-160244_ref1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"Armbrust","year":"2010","journal-title":"Commun of the ACM"},{"key":"10.3233\/MGS-160244_ref4","first-page":"2011","volume-title":"NIST Special Publication 500-292","author":"Liu"},{"key":"10.3233\/MGS-160244_ref5","unstructured":"Queensland Government, Benefits of cloud computing, Retrieved August 31, 2015 from https:\/\/www.business.qld.gov. au\/business\/running\/technology-for-business\/cloud-computing-business\/cloud-computing-benefits"},{"key":"10.3233\/MGS-160244_ref6","unstructured":"Namasudra S., Nath S. and Majumder A., Profile based access control model in cloud computing environment, in: Proceedings of the International Conference on Green Computing, Communication and Electrical Engineering, Coimbatore, India, IEEE, (2014), 1-5."},{"issue":"11","key":"10.3233\/MGS-160244_ref7","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/1839676.1839683","article-title":"Security in the cloud","volume":"53","author":"Anthes","year":"2010","journal-title":"Commun of the ACM"},{"issue":"5","key":"10.3233\/MGS-160244_ref8","first-page":"1819","article-title":"Access control in cloud computing environment","volume":"7","author":"Khan","year":"2012","journal-title":"ARPN J of Engineering and Applied Sciences"},{"key":"10.3233\/MGS-160244_ref9","unstructured":"Sanka S., Hota C. and Rajaraja M., Secure data access in cloud computing, in: Proceedings of the 4th International Conference on Internet Multimedia Systems Architectures and Applications, Bangalore, India, IEEE, (2010), 1-6."},{"issue":"5","key":"10.3233\/MGS-160244_ref10","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1145\/1506409.1506428","article-title":"Technical perspective: A chilly sense of security","volume":"52","author":"Anderson","year":"2009","journal-title":"Commun of the ACM"},{"key":"10.3233\/MGS-160244_ref11","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-1-4471-6452-4_2","volume-title":"Continued Rise of the Cloud","author":"Majumder","year":"2014"},{"key":"10.3233\/MGS-160244_ref12","unstructured":"Namasudra S. and Roy P., Size based access control model in cloud computing, in: Proceedings of the International Conference on Electrical, Electronics, Signals, Communication and Optimization, Visakhapatnam, India, IEEE, (2015), 1-4."},{"key":"10.3233\/MGS-160244_ref13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"Shamir","year":"1985"},{"key":"10.3233\/MGS-160244_ref14","first-page":"457","volume-title":"Advances in Cryptology","author":"Sahai","year":"2005"},{"key":"10.3233\/MGS-160244_ref15","doi-asserted-by":"crossref","unstructured":"Goyal V., Pandey O., Sahai A. and Waters B., Attribute-based encryption for fine-grained access control of encrypted data, in: Proceedings of the 13th Conference on Computer and Communications Security, ACM, (2006), 89-98.","DOI":"10.1145\/1180405.1180418"},{"key":"10.3233\/MGS-160244_ref16","doi-asserted-by":"crossref","unstructured":"Bethencourt J., Sahai A. and Waters B., Ciphertext-policy attribute based encryption, in: Proceedings of the 2007 IEEE Symposium on Security and Privacy, (2007), 321-334.","DOI":"10.1109\/SP.2007.11"},{"key":"10.3233\/MGS-160244_ref17","unstructured":"Bobba R., Khurana H. and Prabhakaran M., Attribute-sets: A practically motivated enhancement to attribute-based encryption, in: Proceedings of the 4th European Conference on Research in Computer Security, Saint-Malo, France, (2009), 587-604."},{"issue":"8","key":"10.3233\/MGS-160244_ref18","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"Lai","year":"2013","journal-title":"IEEE Trans on Information Forensics and Security"},{"key":"10.3233\/MGS-160244_ref19","unstructured":"Green M., Hohenerger S. and Waters B., Outsourcing the decryption of ABE ciphertexts, in: Proceedings of the 20th USENIX Conference on Security, CA, USA, (2011), 34-34."},{"issue":"4","key":"10.3233\/MGS-160244_ref20","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/TMM.2013.2238910","article-title":"Attribute-based access to scalable media in cloud-assisted content sharing networks","volume":"15","author":"Wu","year":"2013","journal-title":"IEEE Trans on Multimedia"},{"issue":"1","key":"10.3233\/MGS-160244_ref21","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.compeleceng.2012.11.002","article-title":"Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage","volume":"39","author":"Koo","year":"2013","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"10.3233\/MGS-160244_ref22","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/TIFS.2014.2368352","article-title":"Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption","volume":"10","author":"Jung","year":"2015","journal-title":"IEEE Trans on Information Forensics and Security"},{"key":"10.3233\/MGS-160244_ref23","doi-asserted-by":"crossref","unstructured":"Green M. and Ateniese G., Identity-based proxy re-encryption, in: Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), (2007), 288-306.","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"10.3233\/MGS-160244_ref24","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/j.ins.2012.09.034","article-title":"Time-based proxy re-encryption scheme for secure data sharing in a cloud environment","volume":"258","author":"Liu","year":"2014","journal-title":"Information Sciences"},{"issue":"3","key":"10.3233\/MGS-160244_ref25","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.future.2012.07.010","article-title":"Identity-based data storage in cloud computing","volume":"29","author":"Han","year":"2013","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"10.3233\/MGS-160244_ref26","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1007\/s12083-014-0295-x","article-title":"A full lifecycle privacy protection scheme for sensitive data in cloud computing","volume":"8","author":"Xiong","year":"2014","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"2","key":"10.3233\/MGS-160244_ref27","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/TPDS.2013.154","article-title":"Distributed, concurrent, and independent access to encrypted cloud databases","volume":"25","author":"Ferretti","year":"2014","journal-title":"IEEE Trans on Parallel and Distributed Systems"},{"key":"10.3233\/MGS-160244_ref28","unstructured":"Yu S., Wang C., Ren K. and Lou W., Achieving secure, scalable, and fine-grained data access control in cloud computing, in: Proceedings of the IEEE INFOCOM, San Diego, CA, (2010), 534-542."},{"issue":"5","key":"10.3233\/MGS-160244_ref29","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","article-title":"Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud server","volume":"30","author":"Wang","year":"2011","journal-title":"Computers & Security"},{"issue":"2","key":"10.3233\/MGS-160244_ref30","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","article-title":"HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing","volume":"7","author":"Wan","year":"2012","journal-title":"IEEE Trans on Information Forensics and Security"},{"key":"10.3233\/MGS-160244_ref31","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.cose.2013.12.002","article-title":"Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing","volume":"42","author":"Dong","year":"2014","journal-title":"Computers & Security"},{"key":"10.3233\/MGS-160244_ref32","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"Cocks","year":"2001"},{"issue":"7","key":"10.3233\/MGS-160244_ref33","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1109\/TPDS.2013.253","article-title":"Expressive, efficient, and revocable data access control for multi-authority cloud storage","volume":"25","author":"Yang","year":"2014","journal-title":"IEEE Trans on Parallel and Distributed Systems"},{"issue":"12","key":"10.3233\/MGS-160244_ref34","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1109\/TIFS.2013.2286456","article-title":"Achieving secure role-based access control on encrypted data in cloud storage","volume":"8","author":"Zhou","year":"2013","journal-title":"IEEE Trans on Information Forensics and Security"}],"container-title":["Multiagent and Grid Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/MGS-160244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T09:36:27Z","timestamp":1741685787000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/MGS-160244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,26]]},"references-count":32,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/mgs-160244","relation":{},"ISSN":["1574-1702","1875-9076"],"issn-type":[{"value":"1574-1702","type":"print"},{"value":"1875-9076","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,26]]}}}