메뉴 건너뛰기




Volumn , Issue , 2011, Pages 91-98

DACC: Distributed access control in clouds

Author keywords

Access control; Bilinear maps; Decentralized attribute based encryption; Storage in Clouds

Indexed keywords

BILINEAR MAP; BILINEAR PAIRING; CLOUD SERVICES; DATA STORAGE; DISTRIBUTED ACCESS CONTROLS; ELLIPTIC CURVE; ENCRYPTED DATA; KEY DISTRIBUTION CENTERS; NEW MODEL; SECURE DATA STORAGE; STORAGE OVERHEAD;

EID: 84856190480     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2011.15     Document Type: Conference Paper
Times cited : (186)

References (36)
  • 1
    • 84874114744 scopus 로고    scopus 로고
    • "Google apps," http://www.google.com/apps.
    • Google Apps
  • 2
  • 3
    • 84885573531 scopus 로고    scopus 로고
    • "Amazon ec2," http://aws.amazon.com/ec2/.
    • Amazon ec2
  • 4
    • 84886582205 scopus 로고    scopus 로고
    • "Eucalyptus," http://www.eucalyptus.com/.
    • Eucalyptus
  • 5
    • 84856142311 scopus 로고    scopus 로고
    • "Nimbus," http://www.nimbusproject.org/.
    • Nimbus
  • 6
    • 84856195467 scopus 로고    scopus 로고
    • "Amazon s3," http://aws.amazon.com/s3/.
    • Amazon s3
  • 7
    • 84864720397 scopus 로고    scopus 로고
    • "Windows azure," http://www.microsoft.com/windowsazure/.
    • Windows Azure
  • 8
    • 71749113079 scopus 로고    scopus 로고
    • Identity-based authentication for cloud computing
    • CloudCom, ser. M. G. Jaatun, G. Zhao, and C. Rong, Eds., Springer
    • H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in CloudCom, ser. Lecture Notes in Computer Science, M. G. Jaatun, G. Zhao, and C. Rong, Eds., vol. 5931. Springer, 2009, pp. 157-166.
    • (2009) Lecture Notes in Computer Science , vol.5931 , pp. 157-166
    • Li, H.1    Dai, Y.2    Tian, L.3    Yang, H.4
  • 9
    • 77954749319 scopus 로고    scopus 로고
    • Token-based cloud computing
    • TRUST, ser. A. Acquisti, S. W. Smith, and A.-R. Sadeghi, Eds., Springer
    • A.-R. Sadeghi, T. Schneider, and M. Winandy, "Token-based cloud computing,"in TRUST, ser. Lecture Notes in Computer Science, A. Acquisti, S. W. Smith, and A.-R. Sadeghi, Eds., vol. 6101. Springer, 2010, pp. 417-429.
    • (2010) Lecture Notes in Computer Science , vol.6101 , pp. 417-429
    • Sadeghi, A.-R.1    Schneider, T.2    Winandy, M.3
  • 11
    • 11144229255 scopus 로고    scopus 로고
    • Ph.D. dissertation, Wroclaw University of Technology
    • G. Wroblewski, "General method of program code obfuscation,"Ph. D. dissertation, Wroclaw University of Technology, 2002, http://www.ouah.org/ wobfuscation.pdf.
    • (2002) General Method of Program Code Obfuscation
    • Wroblewski, G.1
  • 13
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • A. Juels, R. N. Wright, and S. D. C. di Vimercati, Eds. ACM
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions,"in ACM Conference on Computer and Communications Security, A. Juels, R. N. Wright, and S. D. C. di Vimercati, Eds. ACM, 2006, pp. 79-88.
    • (2006) ACM Conference on Computer and Communications Security , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 14
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • IEEE
    • J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, andW. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in INFOCOM. IEEE, 2010, pp. 441-445.
    • (2010) INFOCOM , pp. 441-445
    • Li, J.1    Wang, Q.2    Wang, C.3    Cao, N.4    Ren, K.5    Lou, W.6
  • 15
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • Financial Cryptography Workshops, ser. R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Sebé, Eds., Springer
    • S. Kamara and K. Lauter, "Cryptographic cloud storage," in Financial Cryptography Workshops, ser. Lecture Notes in Computer Science, R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Sebé, Eds., vol. 6054. Springer, 2010, pp. 136-149.
    • (2010) Lecture Notes in Computer Science , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 16
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • SecureComm, ser. Social Informatics and Telecommunications Engineering, S. Jajodia and J. Zhou, Eds., Springer
    • M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in SecureComm, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, S. Jajodia and J. Zhou, Eds., vol. 50. Springer, 2010, pp. 89-106.
    • (2010) Lecture Notes of the Institute for Computer Sciences , vol.50 , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 17
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • D. Feng, D. A. Basin, and P. Liu, Eds. ACM
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in ASIACCS, D. Feng, D. A. Basin, and P. Liu, Eds. ACM, 2010, pp. 261-270.
    • (2010) ASIACCS , pp. 261-270
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 18
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • EUROCRYPT, ser. K. G. Paterson, Ed., Springer
    • A. B. Lewko and B. Waters, "Decentralizing attribute-based encryption,"in EUROCRYPT, ser. Lecture Notes in Computer Science, K. G. Paterson, Ed., vol. 6632. Springer, 2011, pp. 568-588.
    • (2011) Lecture Notes in Computer Science , vol.6632 , pp. 568-588
    • Lewko, A.B.1    Waters, B.2
  • 19
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • EUROCRYPT, ser. R. Cramer, Ed., Springer
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in EUROCRYPT, ser. Lecture Notes in Computer Science, R. Cramer, Ed., vol. 3494. Springer, 2005, pp. 457-473.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 20
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in CRYPTO, 1984, pp. 47-53.
    • (1984) CRYPTO , pp. 47-53
    • Shamir, A.1
  • 23
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • TCC, ser. Springer
    • M. Chase, "Multi-authority attribute based encryption," in TCC, ser. Lecture Notes in Computer Science, vol. 4392. Springer, 2007, pp. 515-534.
    • (2007) Lecture Notes in Computer Science , vol.4392 , pp. 515-534
    • Chase, M.1
  • 25
    • 79960367690 scopus 로고    scopus 로고
    • Improved access control mechanism in vehicular ad hoc networks
    • ADHOC-NOW, ser. H. Frey, X. Li, and S. Rührup, Eds., Springer
    • S. Ruj, A. Nayak, and I. Stojmenovic, "Improved access control mechanism in vehicular ad hoc networks," in ADHOC-NOW, ser. Lecture Notes in Computer Science, H. Frey, X. Li, and S. Rührup, Eds., vol. 6811. Springer, 2011, pp. 191-205.
    • (2011) Lecture Notes in Computer Science , vol.6811 , pp. 191-205
    • Ruj, S.1    Nayak, A.2    Stojmenovic, I.3
  • 26
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds. ACM
    • G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in ACM Conference on Computer and Communications Security, E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds. ACM, 2010, pp. 735-737.
    • (2010) ACM Conference on Computer and Communications Security , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 27
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • EUROCRYPT, ser. L. R. Knudsen, Ed., Springer
    • J. Horwitz and B. Lynn, "Toward hierarchical identity-based encryption,"in EUROCRYPT, ser. Lecture Notes in Computer Science, L. R. Knudsen, Ed., vol. 2332. Springer, 2002, pp. 466-481.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 28
    • 80053267265 scopus 로고    scopus 로고
    • Distributed fine-grained access control in wireless sensor networks
    • IEEE
    • S. Ruj, A. Nayak, and I. Stojmenovic, "Distributed fine-grained access control in wireless sensor networks," in IPDPS. IEEE, 2011, pp. 352-362.
    • (2011) IPDPS , pp. 352-362
    • Ruj, S.1    Nayak, A.2    Stojmenovic, I.3
  • 30
    • 84856196612 scopus 로고    scopus 로고
    • "http://crypto.stanford.edu/pbc/."
  • 31
    • 84856148993 scopus 로고    scopus 로고
    • V. S. Miller, "http://crypto.stanford.edu/miller/miller.pdf."
    • Miller, V.S.1
  • 32
    • 73849107877 scopus 로고    scopus 로고
    • A taxonomy of pairing-friendly elliptic curves
    • D. Freeman, M. Scott, and E. Teske, "A taxonomy of pairing-friendly elliptic curves," J. Cryptology, vol. 23, no. 2, pp. 224-280, 2010.
    • (2010) J. Cryptology , vol.23 , Issue.2 , pp. 224-280
    • Freeman, D.1    Scott, M.2    Teske, E.3
  • 33
    • 79952071204 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 4, pp. 673-686, 2011.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.4 , pp. 673-686
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 36
    • 79951783454 scopus 로고    scopus 로고
    • Attribute-based signatures
    • CT-RSA, ser. A. Kiayias, Ed., Springer
    • H. K. Maji, M. Prabhakaran, and M. Rosulek, "Attribute-based signatures,"in CT-RSA, ser. Lecture Notes in Computer Science, A. Kiayias, Ed., vol. 6558. Springer, 2011, pp. 376-392.
    • (2011) Lecture Notes in Computer Science , vol.6558 , pp. 376-392
    • Maji, H.K.1    Prabhakaran, M.2    Rosulek, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.