KP-ABE based Verifiable Cloud Access Control Scheme
文献类型:会议论文
作者 | Si, Xiaolin ; Wang, Pengpian ; Zhang, Liwu |
出版日期 | 2013 |
会议名称 | 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) |
会议日期 | JUL 16-18, 2013 |
会议地点 | Melbourne, AUSTRALIA |
关键词 | control cloud computing verifiable computation KP-ABE XACML |
页码 | 34-41 |
中文摘要 | With the rapid development of mobile internet, mobile devices are requiring more complex authorization policy to ensure an secure access control on mobile data. However mobiles have limited resources (computing, storage, etc.) and are not suitable to execute complex operations. Cloud computing is an increasingly popular paradigm for accessing powerful computing resources. Intuitively we can solve that problem by moving the complex access control process to the cloud and implement a fine-grained access control relying on the powerful cloud. However the cloud computation may not be trusted, a crucial problem is how to verify the correctness of such computations. In this paper, we proposed a public verifiable cloud access control scheme based on Parno's public verifiable computation protocol. For the first time, we proposed the conception and concrete construction of verifiable cloud access control. Specifically, we firstly design a user private key revocable Key Policy Attribute Based Encryption (KP-ABE) scheme with non-monotonic access structure, which can be combined with the XACML policy perfectly. Secondly we convert the XACML policy into the access structure of KP-ABE. Finally we construct a security provable public verifiable cloud access control scheme based on the KP-ABE scheme we designed. |
英文摘要 | With the rapid development of mobile internet, mobile devices are requiring more complex authorization policy to ensure an secure access control on mobile data. However mobiles have limited resources (computing, storage, etc.) and are not suitable to execute complex operations. Cloud computing is an increasingly popular paradigm for accessing powerful computing resources. Intuitively we can solve that problem by moving the complex access control process to the cloud and implement a fine-grained access control relying on the powerful cloud. However the cloud computation may not be trusted, a crucial problem is how to verify the correctness of such computations. In this paper, we proposed a public verifiable cloud access control scheme based on Parno's public verifiable computation protocol. For the first time, we proposed the conception and concrete construction of verifiable cloud access control. Specifically, we firstly design a user private key revocable Key Policy Attribute Based Encryption (KP-ABE) scheme with non-monotonic access structure, which can be combined with the XACML policy perfectly. Secondly we convert the XACML policy into the access structure of KP-ABE. Finally we construct a security provable public verifiable cloud access control scheme based on the KP-ABE scheme we designed. |
收录类别 | CPCI |
会议录出版地 | IEEE |
语种 | 英语 |
ISSN号 | 2324-898X |
ISBN号 | 978-0-7695-5022-0 |
源URL | [http://ir.iscas.ac.cn/handle/311060/16536] ![]() |
专题 | 软件研究所_软件所图书馆_会议论文 |
推荐引用方式 GB/T 7714 | Si, Xiaolin,Wang, Pengpian,Zhang, Liwu. KP-ABE based Verifiable Cloud Access Control Scheme[C]. 见:12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Melbourne, AUSTRALIA. JUL 16-18, 2013. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。