File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: k-Times Attribute-Based Anonymous Access Control for Cloud Computing

Titlek-Times Attribute-Based Anonymous Access Control for Cloud Computing
Authors
Keywordscloud computing
attribute-based
anonymous access
k-times
Issue Date2015
Citation
IEEE Transactions on Computers, 2015, v. 64, n. 9, p. 2595-2608 How to Cite?
Abstract© 1968-2012 IEEE. In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period or an event. Further additional access will be denied. We also prove the security of our instantiation. Our implementation result shows that our scheme is practical.
Persistent Identifierhttp://hdl.handle.net/10722/260214
ISSN
2021 Impact Factor: 3.183
2020 SCImago Journal Rankings: 0.679
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorYuen, Tsz Hon-
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorHuang, Xinyi-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorZhou, Jianying-
dc.date.accessioned2018-09-12T02:00:47Z-
dc.date.available2018-09-12T02:00:47Z-
dc.date.issued2015-
dc.identifier.citationIEEE Transactions on Computers, 2015, v. 64, n. 9, p. 2595-2608-
dc.identifier.issn0018-9340-
dc.identifier.urihttp://hdl.handle.net/10722/260214-
dc.description.abstract© 1968-2012 IEEE. In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period or an event. Further additional access will be denied. We also prove the security of our instantiation. Our implementation result shows that our scheme is practical.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Computers-
dc.subjectcloud computing-
dc.subjectattribute-based-
dc.subjectanonymous access-
dc.subjectk-times-
dc.titlek-Times Attribute-Based Anonymous Access Control for Cloud Computing-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TC.2014.2366741-
dc.identifier.scopuseid_2-s2.0-84939245573-
dc.identifier.volume64-
dc.identifier.issue9-
dc.identifier.spage2595-
dc.identifier.epage2608-
dc.identifier.isiWOS:000359236500014-
dc.identifier.issnl0018-9340-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats