An Authorized Identity Authentication-based Data Access Control Scheme in Cloud

被引:0
作者
Shen, Jian [1 ]
Liu, Dengzhi [1 ]
Liu, Qi [1 ]
Wang, Baowei [1 ]
Fu, Zhangjie [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
来源
2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE | 2016年
关键词
Cloud computing; access control; user authentication; security; authorized agency;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud computing is a newfound service which has a rapid growth in IT industry recent years. Despite it has a huge contribution to the development of the technology and society, the cloud still exists some security deficiencies to block its development such as data leakage, illegal access and privacy risks. Hence, access control and user authentication is very important in cloud environment. Some related access control schemes has been proposed to solve the security problems in cloud, however, the high computation cost is a crucial factor in practical use. In this paper we propose a novel lightweight identity authenticationbased access control scheme for cloud, due to adopt an authorized agency to assist the authentication and key distribution, this scheme is more efficient and practical than the related work.
引用
收藏
页码:56 / 60
页数:5
相关论文
共 15 条
[1]  
[Anonymous], COMPUTER RES DEV
[2]  
[Anonymous], J COMMUNICATIONS
[3]   Attribute-based encryption schemes with constant-size ciphertexts [J].
Attrapadung, Nuttapong ;
Herranz, Javier ;
Laguillaumie, Fabien ;
Libert, Benoit ;
de Panafieu, Elie ;
Rafols, Carla .
THEORETICAL COMPUTER SCIENCE, 2012, 422 :15-38
[4]   Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement [J].
Fu, Zhangjie ;
Ren, Kui ;
Shu, Jiangang ;
Sun, Xingming ;
Huang, Fengxiao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) :2546-2559
[5]  
Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
[6]   Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption [J].
Han, Jinguang ;
Susilo, Willy ;
Mu, Yi ;
Yan, Jun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) :2150-2162
[7]   Mutual Verifiable Provable Data Auditing in Public Cloud Storage [J].
Ren, Yongjun ;
Shen, Jian ;
Wang, Jin ;
Han, Jin ;
Lee, Sungyoung .
JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (02) :317-323
[8]  
Sabahi F., 2011, IEEE 3 INT C COMMUNI, P245, DOI [10.1109/ICCSN.2011.6014715, DOI 10.1109/ICCSN.2011.6014715]
[9]   An Access Control Model for Cloud Computing Environments [J].
Thomas, Manoj V. ;
Sekaran, K. Chandra .
2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, :226-231
[10]   A more efficient and secure dynamic ID-based remote user authentication scheme [J].
Wang, Yan-yan ;
Liu, Jia-yong ;
Xiao, Feng-xia ;
Dan, Jing .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :583-585