An Effective and Secure Access Control System Scheme in the Cloud

被引:13
作者
Niu Shaozhang [1 ]
Tu Shanshan [1 ]
Huang Yongfeng [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing Key Lab Intelligent Telecommun Software &, Beijing 100876, Peoples R China
[2] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Cloud computing; Access control; Attribute encryption; Security and efficiency;
D O I
10.1049/cje.2015.07.015
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing services have got rapid development in the field of the lightweight terminal, especially wireless communications. The comprehensive access control system framework is proposed for the cloud. A kind of access control scheme based on attribute encryption is designed, in which lightweight devices can safely use cloud computing resources to outsource encrypt/decrypt operations, and not worry for exposing terminal sensitive data. The scheme is verified by performance evaluation about the security, computing, storage, to ensure the legitimate interests of users in the cloud.
引用
收藏
页码:524 / 528
页数:5
相关论文
共 50 条
  • [21] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):
  • [22] DACPCC: A Data Access Control Scheme with Access Permission for Cloud Computing
    Wang Y.-D.
    Yang J.-H.
    Yang, Jia-Hai (yang@cernet.edu.cn), 2018, Chinese Institute of Electronics (46): : 236 - 244
  • [23] An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 39 - 47
  • [24] Secure PHR Access Control Scheme for Healthcare Application Clouds
    Liu, Chia-Hui
    Lin, Fong-Qi
    Chiang, Dai-Lun
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Lin, Han-Yu
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    2013 42ND ANNUAL INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP), 2013, : 1067 - 1076
  • [25] A Secure Blockchain-Assisted Access Control Scheme for Smart Healthcare System in Fog Computing
    Li, Jiahao
    Li, Dongmei
    Zhang, Xiaomei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 15980 - 15989
  • [26] A Survey: Secure Cloud Data Storage and Access Control System Using Blockchain
    Patel, Kashyap
    Modi, Ritiksha
    Sharma, Shital
    Patel, Minal
    SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 195 - 207
  • [27] An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 110 - 117
  • [28] Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage
    Qi, Saiyu
    Wei, Wei
    Wang, Jianfeng
    Sun, Shifeng
    Rutkowski, Leszek
    Huang, Tingwen
    Kacprzyk, Janusz
    Qi, Yong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2566 - 2582
  • [29] Efficient decentralized access control for secure data sharing in cloud computing
    Liu, Tonglai
    Wu, Jigang
    Li, Jiaxing
    Li, Jingyi
    Li, Yidong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (17)
  • [30] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing
    Ghimes, Ana-Maria
    Patriciu, Victor Valeriu
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285