Towards temporal access control in cloud computing

INFOCOM(2012)

引用 129|浏览75
暂无评分
摘要
Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integrate data access policies within the encrypted data. However, little work has been done to explore temporal attributes in specifying and enforcing the data owner's policy and the data user's privileges in cloud-based environments. In this paper, we present an efficient temporal access control encryption scheme for cloud services with the help of cryptographic integer comparisons and a proxy-based re-encryption mechanism on the current time. We also provide a dual comparative expression of integer ranges to extend the power of attribute expression for implementing various temporal constraints. We prove the security strength of the proposed scheme and our experimental results not only validate the effectiveness of our scheme, but also show that the proposed integer comparison scheme performs significantly better than previous bitwise comparison scheme.
更多
查看译文
关键词
data access policy integration,integer comparison,cryptography,encrypted data,re-encryption,proxy-based reencryption mechanism,integer comparison scheme,temporal access control,cloud services,cryptographic integer comparisons,authorisation,attribute expression,security strength,cloud computing,attribute-based access control,temporal access control encryption scheme,access control,servers,computational modeling,encryption,computer model,data access
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要