File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Privacy-preserved access control for cloud computing

TitlePrivacy-preserved access control for cloud computing
Authors
KeywordsEncryption
Cloud Computing
Access Control
Issue Date2011
Citation
Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, 2011, p. 83-90 How to Cite?
AbstractThe problem of access control on outsourced data to "honest but curious" cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data files, where re-encryption and re-transmission by the data owner may not be acceptable. Considering the user privacy and data security in cloud environment, in this paper, we propose a solution to achieve flexible and fine-grained access control on outsourced data files. In particular, we look at the problem of defining and assigning keys to users based on different attribute sets, and hiding access policies as well as users information to the third-party cloud servers. Our proposed scheme is partially based on our observation that, in practical application scenarios each user can be associated with a set of attributes which are meaningful in the access policy and data file context. The access policy can thus be defined as a logical expression formula over different attribute sets to reflect the scope of data file that the kind of users is allowed to access. As any access policy can be represented as such a logical expression formula, fine-grained access control can be accomplished. © 2011 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/280774
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorZhou, Miao-
dc.contributor.authorMu, Yi-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorYan, Jun-
dc.date.accessioned2020-02-17T14:34:54Z-
dc.date.available2020-02-17T14:34:54Z-
dc.date.issued2011-
dc.identifier.citationProc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, 2011, p. 83-90-
dc.identifier.urihttp://hdl.handle.net/10722/280774-
dc.description.abstractThe problem of access control on outsourced data to "honest but curious" cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data files, where re-encryption and re-transmission by the data owner may not be acceptable. Considering the user privacy and data security in cloud environment, in this paper, we propose a solution to achieve flexible and fine-grained access control on outsourced data files. In particular, we look at the problem of defining and assigning keys to users based on different attribute sets, and hiding access policies as well as users information to the third-party cloud servers. Our proposed scheme is partially based on our observation that, in practical application scenarios each user can be associated with a set of attributes which are meaningful in the access policy and data file context. The access policy can thus be defined as a logical expression formula over different attribute sets to reflect the scope of data file that the kind of users is allowed to access. As any access policy can be represented as such a logical expression formula, fine-grained access control can be accomplished. © 2011 IEEE.-
dc.languageeng-
dc.relation.ispartofProc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011-
dc.subjectEncryption-
dc.subjectCloud Computing-
dc.subjectAccess Control-
dc.titlePrivacy-preserved access control for cloud computing-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TrustCom.2011.14-
dc.identifier.scopuseid_2-s2.0-84856182942-
dc.identifier.spage83-
dc.identifier.epage90-
dc.identifier.isiWOS:000410208500014-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats