NIU Shaozhang, TU Shanshan, Huang Yongfeng. An Effective and Secure Access Control System Scheme in the Cloud[J]. Chinese Journal of Electronics, 2015, 24(3): 524-528. doi: 10.1049/cje.2015.07.015
Citation: NIU Shaozhang, TU Shanshan, Huang Yongfeng. An Effective and Secure Access Control System Scheme in the Cloud[J]. Chinese Journal of Electronics, 2015, 24(3): 524-528. doi: 10.1049/cje.2015.07.015

An Effective and Secure Access Control System Scheme in the Cloud

doi: 10.1049/cje.2015.07.015
Funds:  This work is supported by National Natural Science Foundation of China (No.61070207, No.61370195), Beijing Natural Science Foundation (No.4132060) and National Cryptography Development Foundation of China (No.MMJJ201201002).
  • Received Date: 2014-01-23
  • Rev Recd Date: 2014-03-11
  • Publish Date: 2015-07-10
  • Cloud computing services have got rapid development in the field of the lightweight terminal, especially wireless communications. The comprehensive access control system framework is proposed for the cloud. A kind of access control scheme based on attribute encryption is designed, in which lightweight devices can safely use cloud computing resources to outsource encrypt/decrypt operations, and not worry for exposing terminal sensitive data. The scheme is verified by performance evaluation about the security, computing, storage, to ensure the legitimate interests of users in the cloud.
  • loading
  • K. Yang, X. Jia, K. Ren, B. Zhang and R. Xie, "Effective data access control for multi-authority cloud storage", IEEE Trans. Systems Information Forensics and Security, Vol.8, No.11, pp.1790-1801, 2013.
    M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption", IEEE Trans. Parallel Distrib. Syst., Vol.24, No.1, pp.131-143, 2013.
    S. Yu, C. Wang, K. Ren, et al., "Achieving secure, scalable, and fine-grained data access control in cloud computing", Proc. of INFOCOM, San Diego, CA, pp.534-542, 2010.
    K. Yang, X. Jia and K. Ren, "Attribute-based fine-grained access control with efficient revocation in cloud storage systems", Proc. of ASIACCS, NY, USA, pp.523-528, 2013.
    C. Wang, Q. Wang, K. Ren and W. Lou, "Towards secure and dependable storage services in cloud computing", IEEE Trans. Service Computing, Vol.5, No.2, pp.220-232, 2012.
    S. Tu, S. Niu and M. Li, "An efficient access control scheme for cloud environment", Cybernetics and Information Technologies, Vol.13, No.3, pp.77-90, 2013.
    J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. of IEEE Symposium on Security and Privacy, Oakland, California, USA, pp.321-334, 2007.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (237) PDF downloads(1492) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return