File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TrustCom.2011.14
- Scopus: eid_2-s2.0-84856182942
- WOS: WOS:000410208500014
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Privacy-preserved access control for cloud computing
Title | Privacy-preserved access control for cloud computing |
---|---|
Authors | |
Keywords | Encryption Cloud Computing Access Control |
Issue Date | 2011 |
Citation | Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, 2011, p. 83-90 How to Cite? |
Abstract | The problem of access control on outsourced data to "honest but curious" cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data files, where re-encryption and re-transmission by the data owner may not be acceptable. Considering the user privacy and data security in cloud environment, in this paper, we propose a solution to achieve flexible and fine-grained access control on outsourced data files. In particular, we look at the problem of defining and assigning keys to users based on different attribute sets, and hiding access policies as well as users information to the third-party cloud servers. Our proposed scheme is partially based on our observation that, in practical application scenarios each user can be associated with a set of attributes which are meaningful in the access policy and data file context. The access policy can thus be defined as a logical expression formula over different attribute sets to reflect the scope of data file that the kind of users is allowed to access. As any access policy can be represented as such a logical expression formula, fine-grained access control can be accomplished. © 2011 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/280774 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhou, Miao | - |
dc.contributor.author | Mu, Yi | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Yan, Jun | - |
dc.date.accessioned | 2020-02-17T14:34:54Z | - |
dc.date.available | 2020-02-17T14:34:54Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, 2011, p. 83-90 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280774 | - |
dc.description.abstract | The problem of access control on outsourced data to "honest but curious" cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data files, where re-encryption and re-transmission by the data owner may not be acceptable. Considering the user privacy and data security in cloud environment, in this paper, we propose a solution to achieve flexible and fine-grained access control on outsourced data files. In particular, we look at the problem of defining and assigning keys to users based on different attribute sets, and hiding access policies as well as users information to the third-party cloud servers. Our proposed scheme is partially based on our observation that, in practical application scenarios each user can be associated with a set of attributes which are meaningful in the access policy and data file context. The access policy can thus be defined as a logical expression formula over different attribute sets to reflect the scope of data file that the kind of users is allowed to access. As any access policy can be represented as such a logical expression formula, fine-grained access control can be accomplished. © 2011 IEEE. | - |
dc.language | eng | - |
dc.relation.ispartof | Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011 | - |
dc.subject | Encryption | - |
dc.subject | Cloud Computing | - |
dc.subject | Access Control | - |
dc.title | Privacy-preserved access control for cloud computing | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TrustCom.2011.14 | - |
dc.identifier.scopus | eid_2-s2.0-84856182942 | - |
dc.identifier.spage | 83 | - |
dc.identifier.epage | 90 | - |
dc.identifier.isi | WOS:000410208500014 | - |