A Lightweight Access Control Mechanism for Mobile Cloud Computing

被引:0
|
作者
Yao, Xuanxia [1 ]
Han, Xiaoguang [1 ]
Du, Xiaojiang [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
美国国家科学基金会;
关键词
Authorization; certificate; access control; mobile cloud storage;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to meet the security requirement, most data are stored in cloud as cipher-texts. Hence, a cipher-text based access control mechanism is needed for data sharing in cloud. A popular solution is to use the attribute-based encryption. However, it is not suitable for mobile cloud due to the heavy computation overhead caused by bilinear pairing, which also makes it difficult to change the access control policy. In addition, attribute-based encryption can't achieve fine-grained access control yet. In this paper, we present a lightweight cipher-text access control mechanism for mobile cloud computing, which is based on authorization certificates and secret sharing. Only the certificate owner can reconstruct decryption keys for his/her files. Our analyses show that the mechanism can achieve efficient and fine-grained access control on cipher-text at a much lower cost than the attribute-based encryption solution.
引用
收藏
页码:380 / 385
页数:6
相关论文
共 50 条
  • [41] Risk Based Access Control In Cloud Computing
    Lakshmi, H.
    Namitha, S.
    Seemanthini
    Gopalan, Satheesh
    Sanjay, H. A.
    Chandrashekaran, K.
    Bhaskar, Atul
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1502 - 1505
  • [42] Enhancing Access Control Trees for Cloud Computing
    Ayeb, Neil
    Di Cerbo, Francesco
    Trabelsi, Slim
    CURRENT TRENDS IN WEB ENGINEERING, ICWE 2016 INTERNATIONAL WORKSHOPS, 2016, 9881 : 29 - 38
  • [43] Verifiable computation with access control in cloud computing
    Xu, Lingling
    Tang, Shaohua
    JOURNAL OF SUPERCOMPUTING, 2014, 69 (02): : 528 - 546
  • [44] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [45] Key techniques of access control for cloud computing
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Qing, Yu
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02): : 312 - 319
  • [46] Access Control Models for Cloud Computing: A Review
    Shan, Ting Li
    Ismail, Saiful Adli
    Azizan, Azizul
    2018 2ND INTERNATIONAL CONFERENCE ON TELEMATICS AND FUTURE GENERATION NETWORKS (TAFGEN), 2018, : 155 - 158
  • [47] A survey on access control mechanisms for cloud computing
    El Sibai, Rayane
    Gemayel, Nader
    Abdo, Jacques Bou
    Demerjian, Jacques
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [48] Access Control Aware Search on the Cloud Computing
    Kaci, Abdellah
    Bouabana-Tebibel, Thouraya
    Challal, Zakia
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1258 - 1264
  • [49] Negative Authorization in Access Control for Cloud Computing
    Li Xiaohui
    He Jingsha
    Zhang Ting
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 307 - 312
  • [50] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94