A Lightweight Access Control Mechanism for Mobile Cloud Computing

被引:0
|
作者
Yao, Xuanxia [1 ]
Han, Xiaoguang [1 ]
Du, Xiaojiang [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
美国国家科学基金会;
关键词
Authorization; certificate; access control; mobile cloud storage;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to meet the security requirement, most data are stored in cloud as cipher-texts. Hence, a cipher-text based access control mechanism is needed for data sharing in cloud. A popular solution is to use the attribute-based encryption. However, it is not suitable for mobile cloud due to the heavy computation overhead caused by bilinear pairing, which also makes it difficult to change the access control policy. In addition, attribute-based encryption can't achieve fine-grained access control yet. In this paper, we present a lightweight cipher-text access control mechanism for mobile cloud computing, which is based on authorization certificates and secret sharing. Only the certificate owner can reconstruct decryption keys for his/her files. Our analyses show that the mechanism can achieve efficient and fine-grained access control on cipher-text at a much lower cost than the attribute-based encryption solution.
引用
收藏
页码:380 / 385
页数:6
相关论文
共 50 条
  • [31] A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing
    Heng He
    Ji Zhang
    Jinguang Gu
    Yan Hu
    Fangfang Xu
    Cluster Computing, 2017, 20 : 1457 - 1472
  • [32] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [33] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [34] Towards Temporal Access Control in Cloud Computing
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Huang, Dijiang
    Wang, Shanbiao
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2576 - 2580
  • [35] Survey on Access Control Issues in Cloud Computing
    Charanya, R.
    Aramudhan, M.
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [36] A Survey of Cloud Computing Access Control Technology
    Wang, Minghao
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [37] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231
  • [38] Verifiable computation with access control in cloud computing
    Lingling Xu
    Shaohua Tang
    The Journal of Supercomputing, 2014, 69 : 528 - 546
  • [39] Discussion on Access Control Technology of Cloud Computing
    Wang, Yibai
    Chen, Shi
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 77 - 80
  • [40] A novel access control model in cloud computing
    Chang, Lingxia
    Wang, Fengying
    ICIC Express Letters, 2014, 8 (08): : 2163 - 2168