Hierarchical Identity Role based proxy re-encryption scheme for cloud computing

被引:0
作者
Nirmala, V [1 ]
Shanmugalakshmi, R. [1 ]
机构
[1] Govt Coll Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
来源
PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS) | 2013年
关键词
Access Control; Cloud Computing; Proxy Re-encryption; Attribute based Encryption; Cloud Security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing offers customers resources for storing and computing when on-demand in pay-as-you-use manner. During storage, data owner need not want to maintain the local copy of the data. Instead, the "cloud" will maintain the data. In this scenario, it may be like data owner has less control on his data. In order to bring more control to data owner proper access control policies should be devised. Access control is a mechanism that provides prevention of unauthorized use of a resource. The policies will decide who can view the data and what action he is allowed to perform on the data. To overcome this, a hierarchical identity role based proxy re-encryption scheme has been adopted which allows a user to encrypt his data under his identity based on his role in his hierarchy to protect his data from leaking and, to delegate his data management capability to the cloud. This paper focuses on integration of hierarchical role identity with proxy re-encryption scheme to enhance the access control .
引用
收藏
页数:4
相关论文
共 11 条
  • [1] [Anonymous], 2012, IEEE T INFORM FORENS
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [4] Goyal V., 2006, ACM CCS 2006, P89, DOI DOI 10.1145/1180405.1180418
  • [5] Mather T., CLOUD SECURITY PRIVA
  • [6] Nirmala V., 2013, IJCA INT C COMM COMP
  • [7] Attribute-Based Encryption with Non-Monotonic Access Structures
    Ostrovsky, Rafail
    Sahai, Amit
    Waters, Brent
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 195 - +
  • [8] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [9] Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    Yu, Shucheng
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [10] Zhu Y., 2012, CODASPY