NIU Shaozhang, TU Shanshan, Huang Yongfeng, “An Effective and Secure Access Control System Scheme in the Cloud,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 524-528, 2015, doi: 10.1049/cje.2015.07.015
Citation:
NIU Shaozhang, TU Shanshan, Huang Yongfeng, “An Effective and Secure Access Control System Scheme in the Cloud,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 524-528, 2015, doi: 10.1049/cje.2015.07.015
NIU Shaozhang, TU Shanshan, Huang Yongfeng, “An Effective and Secure Access Control System Scheme in the Cloud,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 524-528, 2015, doi: 10.1049/cje.2015.07.015
Citation:
NIU Shaozhang, TU Shanshan, Huang Yongfeng, “An Effective and Secure Access Control System Scheme in the Cloud,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 524-528, 2015, doi: 10.1049/cje.2015.07.015
Beijing Key Lab of Intelligent Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China;
2.
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
Funds:
This work is supported by National Natural Science Foundation of China (No.61070207, No.61370195), Beijing Natural Science Foundation (No.4132060) and National Cryptography Development Foundation of China (No.MMJJ201201002).
Cloud computing services have got rapid development in the field of the lightweight terminal, especially wireless communications. The comprehensive access control system framework is proposed for the cloud. A kind of access control scheme based on attribute encryption is designed, in which lightweight devices can safely use cloud computing resources to outsource encrypt/decrypt operations, and not worry for exposing terminal sensitive data. The scheme is verified by performance evaluation about the security, computing, storage, to ensure the legitimate interests of users in the cloud.
K. Yang, X. Jia, K. Ren, B. Zhang and R. Xie, "Effective data access control for multi-authority cloud storage", IEEE Trans. Systems Information Forensics and Security, Vol.8, No.11, pp.1790-1801, 2013.
M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption", IEEE Trans. Parallel Distrib. Syst., Vol.24, No.1, pp.131-143, 2013.
S. Yu, C. Wang, K. Ren, et al., "Achieving secure, scalable, and fine-grained data access control in cloud computing", Proc. of INFOCOM, San Diego, CA, pp.534-542, 2010.
K. Yang, X. Jia and K. Ren, "Attribute-based fine-grained access control with efficient revocation in cloud storage systems", Proc. of ASIACCS, NY, USA, pp.523-528, 2013.
C. Wang, Q. Wang, K. Ren and W. Lou, "Towards secure and dependable storage services in cloud computing", IEEE Trans. Service Computing, Vol.5, No.2, pp.220-232, 2012.
S. Tu, S. Niu and M. Li, "An efficient access control scheme for cloud environment", Cybernetics and Information Technologies, Vol.13, No.3, pp.77-90, 2013.
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. of IEEE Symposium on Security and Privacy, Oakland, California, USA, pp.321-334, 2007.