期刊文献+

FACOR:Flexible Access Control with Outsourceable Revocation in Mobile Clouds 被引量:2

FACOR:Flexible Access Control with Outsourceable Revocation in Mobile Clouds
在线阅读 下载PDF
导出
摘要 Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile devices. However, less attention has been paid to the efficiency of revocation when there are mobile devices needed to be revoked. In this paper, we put forward a new solution, referred to as flexible access control with outsourceable revocation(FACOR) for mobile clouds. The FACOR applies the attribute-based encryption to enable flexible access control on outsourced data, and allows mobile users to outsource the time-consuming encryption and decryption computations to proxies, with only requiring attributes authorization to be fully trusted. As an advantageous feature, FACOR provides an outsourceable revocation for mobile users to reduce the complicated attribute-based revocation operations. The security analysis shows that our FACOR scheme achieves data security against collusion attacks and unauthorized accesses from revoked users. Both theoretical and experimental results confirm that our proposed scheme greatly reliefs the mobile devices from heavy encryption and decryption computations, as well as the complicated revocation of access rights in mobile clouds. Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile devices. However, less attention has been paid to the efficiency of revocation when there are mobile devices needed to be revoked. In this paper, we put forward a new solution, referred to as flexible access control with outsourceable revocation(FACOR) for mobile clouds. The FACOR applies the attribute-based encryption to enable flexible access control on outsourced data, and allows mobile users to outsource the time-consuming encryption and decryption computations to proxies, with only requiring attributes authorization to be fully trusted. As an advantageous feature, FACOR provides an outsourceable revocation for mobile users to reduce the complicated attribute-based revocation operations. The security analysis shows that our FACOR scheme achieves data security against collusion attacks and unauthorized accesses from revoked users. Both theoretical and experimental results confirm that our proposed scheme greatly reliefs the mobile devices from heavy encryption and decryption computations, as well as the complicated revocation of access rights in mobile clouds.
出处 《China Communications》 SCIE CSCD 2016年第4期136-150,共15页 中国通信(英文版)
基金 supported in part by National High-Tech Research and Development Program of China(“863” Program)under Grant No.2015AA016004 National Natural Science Foundation of China under Grants No.61173154,61272451,61572380
关键词 mobile cloud computing ABE OUTSOURCING user revocation mobile cloud computing ABE outsourcing user revocation
  • 相关文献

参考文献2

二级参考文献57

  • 1D. Kusnetzky. What is "Big Data?" [Online]. Available: http://blogs.zd net.com/virtualiza- tion/?p = 1708.
  • 2K. Kant, "Data center evolution: A tutorial on state of the art, issues, and challenges," Com- puter Networks, vol. 53, no. 17, pp. 2939- 2965, 2009, virtualized Data Centers. [Online]. Avail- able: http://www.sciencedirect.com/science/ article/pii/S1389128609003090.
  • 3M. L. Norman and A. Snavely, "Accelerating da- ta-intensive science with gordon and dash," in Proceedings of the 2010 TeraGrid Conference, ser. TG '10. New York, NY, USA: ACM, 2010, pp. 14:1-14:7.[Online]. Available: http://doi.acm. org/10.1145/1838574.1838588.
  • 4X. Zhang, H. tao Du, J. quan Chen, Y. Lin, and L.jie Zeng, "Ensure data security in cloud storage," in Network Computing and Information Secu- rity (NCIS), 2011 International Conference on, vol. 1, may 2011, pp. 284 -287.
  • 5Liu Q, Wang G, Wu J. Secure and privacy pre- serving keyword searching for cloud storage services [J]. Journal of network and computer applications, 2012, 35(3): 927-933.
  • 6Cidon A, Stutsman R, Rumble S, et al. MinCo- pysets: Derandomizing Replication in Cloud Storage[C]//Networked Systems Design and Implementation (NSDI). 2013.
  • 7Inbarani W S, Moorthy G S, Paul C K C. An Approach for Storage Security in Cloud Com- puting-A Survey[J]. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013, 2(1): pp: 174-179.
  • 8Curran R J, Haskin R L. File level security for a metadata controller in a storage area network: U.S. Patent 7,840,995[P]. 2010-11-23.
  • 9Shmueli, Erez, et al. "Database encryption: an overview of contemporary challenges and de- sign considerations." ACM SIGMOD Record 38.3 (2010): 29-34.
  • 10Sabahi F. Virtualization-level security in cloud computing[C]//Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011: 250-254.

共引文献9

同被引文献6

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部