An Effective and Secure Access Control System Scheme in the Cloud

被引:13
|
作者
Niu Shaozhang [1 ]
Tu Shanshan [1 ]
Huang Yongfeng [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing Key Lab Intelligent Telecommun Software &, Beijing 100876, Peoples R China
[2] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Cloud computing; Access control; Attribute encryption; Security and efficiency;
D O I
10.1049/cje.2015.07.015
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing services have got rapid development in the field of the lightweight terminal, especially wireless communications. The comprehensive access control system framework is proposed for the cloud. A kind of access control scheme based on attribute encryption is designed, in which lightweight devices can safely use cloud computing resources to outsource encrypt/decrypt operations, and not worry for exposing terminal sensitive data. The scheme is verified by performance evaluation about the security, computing, storage, to ensure the legitimate interests of users in the cloud.
引用
收藏
页码:524 / 528
页数:5
相关论文
共 50 条
  • [1] An Effective and Secure Access Control System Scheme in the Cloud
    NIU Shaozhang
    TU Shanshan
    Huang Yongfeng
    ChineseJournalofElectronics, 2015, 24 (03) : 524 - 528
  • [2] An access control and authentication scheme for secure data sharing in the decentralized cloud storage system
    Khatiwada, Pankaj
    Yang, Bian
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 137 - 144
  • [3] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Bau, Jian-Guo
    Lin, Tzu-Ching
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 4005 - 4020
  • [4] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [5] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Tzer-Shyong Chen
    Chia-Hui Liu
    Tzer-Long Chen
    Chin-Sheng Chen
    Jian-Guo Bau
    Tzu-Ching Lin
    Journal of Medical Systems, 2012, 36 : 4005 - 4020
  • [6] A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
    Jin, Yu
    Tian, Chuan
    He, Heng
    Wang, Fan
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 172 - 179
  • [7] Secure Access Control Scheme of RFID System Application
    Huang, Yu-Chih
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 525 - 528
  • [8] A secure and effective access control scheme for distributed wireless sensor networks
    Chatterjee, Santanu
    Das, Ashok Kumar
    Sing, Jamuna Kanta
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (01) : 40 - 73
  • [9] Secure Updatable Storage Access Control System for EHRs in the Cloud
    Wang, Jingwei
    Yin, Xinchun
    Ning, Jianting
    Xu, Shengmin
    Xu, Guowen
    Huang, Xinyi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2939 - 2953
  • [10] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)