메뉴 건너뛰기




Volumn 80, Issue 8, 2014, Pages 1518-1533

Secure administration of cryptographic role-based access control for large-scale cloud storage systems

Author keywords

Administration; Cloud computing; Cryptographic RBAC; Data storage; Role based access control; Role based encryption

Indexed keywords

CLOUD COMPUTING; COST EFFECTIVENESS; CRYPTOGRAPHY; DIGITAL STORAGE; LARGE SCALE SYSTEMS; MANAGEMENT;

EID: 84905122477     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2014.04.019     Document Type: Article
Times cited : (22)

References (31)
  • 2
    • 85011043313 scopus 로고    scopus 로고
    • Over-encryption: Management of access control evolution on outsourced data
    • ACM
    • S.D.C.D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati Over-encryption: management of access control evolution on outsourced data VLDB 2007 ACM 123 134
    • (2007) VLDB , pp. 123-134
    • Vimercati, S.D.C.D.1    Foresti, S.2    Jajodia, S.3    Paraboschi, S.4    Samarati, P.5
  • 3
    • 77954464328 scopus 로고    scopus 로고
    • Cryptographic role-based security mechanisms based on role-key hierarchy
    • ACM
    • Y. Zhu, G.-J. Ahn, H. Hu, and H. Wang Cryptographic role-based security mechanisms based on role-key hierarchy ASIACCS 2010 ACM 314 319
    • (2010) ASIACCS , pp. 314-319
    • Zhu, Y.1    Ahn, G.-J.2    Hu, H.3    Wang, H.4
  • 4
    • 80053516153 scopus 로고    scopus 로고
    • Enforcing role-based access control for secure data storage in the cloud
    • L. Zhou, V. Varadharajan, and M. Hitchens Enforcing role-based access control for secure data storage in the cloud Comput. J. 54 2011 1675 1687
    • (2011) Comput. J. , vol.54 , pp. 1675-1687
    • Zhou, L.1    Varadharajan, V.2    Hitchens, M.3
  • 6
    • 84977755884 scopus 로고    scopus 로고
    • The ARBAC99 model for administration of roles
    • IEEE Computer Society
    • R.S. Sandhu, and Q. Munawer The ARBAC99 model for administration of roles ACSAC 1999 IEEE Computer Society 229 238
    • (1999) ACSAC , pp. 229-238
    • Sandhu, R.S.1    Munawer, Q.2
  • 7
    • 0242491000 scopus 로고    scopus 로고
    • A model for role administration using organization structure
    • S. Oh, and R. Sandhu A model for role administration using organization structure SACMAT 2002 155 162
    • (2002) SACMAT , pp. 155-162
    • Oh, S.1    Sandhu, R.2
  • 8
    • 33748319570 scopus 로고    scopus 로고
    • An effective role administration model using organization structure
    • S. Oh, R. Sandhu, and X. Zhang An effective role administration model using organization structure ACM Trans. Inf. Syst. Secur. 9 2006 113 137
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , pp. 113-137
    • Oh, S.1    Sandhu, R.2    Zhang, X.3
  • 9
    • 0242625209 scopus 로고    scopus 로고
    • Administrative scope and role hierarchy operations
    • ACM
    • J. Crampton, and G. Loizou Administrative scope and role hierarchy operations SACMAT 2002 ACM 145 154
    • (2002) SACMAT , pp. 145-154
    • Crampton, J.1    Loizou, G.2
  • 10
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • J. Crampton, and G. Loizou Administrative scope: a foundation for role-based administrative models ACM Trans. Inf. Syst. Secur. 6 2003 201 231
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , pp. 201-231
    • Crampton, J.1    Loizou, G.2
  • 13
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Trans. Comput. Syst. 1 1983 239 248
    • (1983) ACM Trans. Comput. Syst. , vol.1 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 18
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical id-based cryptography
    • Lect. Notes Comput. Sci. Springer
    • C. Gentry, and A. Silverberg Hierarchical id-based cryptography ASIACRYPT Lect. Notes Comput. Sci. vol. 2501 2002 Springer 548 566
    • (2002) ASIACRYPT , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 19
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Lect. Notes Comput. Sci. Springer
    • D. Boneh, X. Boyen, and E.-J. Goh Hierarchical identity based encryption with constant size ciphertext EUROCRYPT Lect. Notes Comput. Sci. vol. 3494 2005 Springer 440 456
    • (2005) EUROCRYPT , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 20
    • 80054995027 scopus 로고    scopus 로고
    • Provably secure role-based encryption with revocation mechanism
    • Y. Zhu, H. Hu, G.-J. Ahn, H. Wang, and S.-B. Wang Provably secure role-based encryption with revocation mechanism J. Comput. Sci. Technol. 26 2011 697 710
    • (2011) J. Comput. Sci. Technol. , vol.26 , pp. 697-710
    • Zhu, Y.1    Hu, H.2    Ahn, G.-J.3    Wang, H.4    Wang, S.-B.5
  • 22
    • 33745604534 scopus 로고    scopus 로고
    • Pairing-friendly elliptic curves of prime order
    • Lect. Notes Comput. Sci. Springer
    • P.S.L.M. Barreto, and M. Naehrig Pairing-friendly elliptic curves of prime order Selected Areas in Cryptography Lect. Notes Comput. Sci. vol. 3897 2005 Springer 319 331
    • (2005) Selected Areas in Cryptography , vol.3897 , pp. 319-331
    • Barreto, P.S.L.M.1    Naehrig, M.2
  • 23
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Lect. Notes Comput. Sci. Springer
    • C. Cocks An identity based encryption scheme based on quadratic residues IMA Int. Conf Lect. Notes Comput. Sci. vol. 2260 2001 Springer 360 363
    • (2001) IMA Int. Conf , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 24
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing SIAM J. Comput. 32 2003 586 615
    • (2003) SIAM J. Comput. , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 25
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity-based encryption without random oracles
    • Lect. Notes Comput. Sci. Springer
    • D. Boneh, and X. Boyen Efficient selective-id secure identity-based encryption without random oracles EUROCRYPT Lect. Notes Comput. Sci. vol. 3027 2004 Springer 223 238
    • (2004) EUROCRYPT , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 26
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Lect. Notes Comput. Sci. Springer
    • D. Boneh, and X. Boyen Secure identity based encryption without random oracles CRYPTO Lect. Notes Comput. Sci. vol. 3152 2004 Springer 443 459
    • (2004) CRYPTO , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 27
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Lect. Notes Comput. Sci. Springer
    • F. Hess Efficient identity based signature schemes based on pairings Selected Areas in Cryptography Lect. Notes Comput. Sci. vol. 2595 2002 Springer 310 324
    • (2002) Selected Areas in Cryptography , vol.2595 , pp. 310-324
    • Hess, F.1
  • 28
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • Lect. Notes Comput. Sci. Springer
    • J.C. Cha, and J.H. Cheon An identity-based signature from gap Diffie-Hellman groups Public Key Cryptography Lect. Notes Comput. Sci. vol. 2567 2003 Springer 18 30
    • (2003) Public Key Cryptography , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 29
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    • Lect. Notes Comput. Sci. Springer
    • P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.-J. Quisquater Efficient and provably-secure identity-based signatures and signcryption from bilinear maps ASIACRYPT Lect. Notes Comput. Sci. vol. 3788 2005 Springer 515 532
    • (2005) ASIACRYPT , vol.3788 , pp. 515-532
    • Barreto, P.S.L.M.1    Libert, B.2    McCullagh, N.3    Quisquater, J.-J.4
  • 30
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Lect. Notes Comput. Sci. Springer
    • R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption EUROCRYPT Lect. Notes Comput. Sci. vol. 3027 2004 Springer 207 222
    • (2004) EUROCRYPT , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 31
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    • Lect. Notes Comput. Sci. Springer
    • D. Boneh, and J. Katz Improved efficiency for CCA-secure cryptosystems built using identity-based encryption CT-RSA Lect. Notes Comput. Sci. vol. 3376 2005 Springer 87 103
    • (2005) CT-RSA , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.