메뉴 건너뛰기




Volumn 65, Issue 7, 2016, Pages 2325-2331

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing

Author keywords

Access control; hierarchical key assignment; linear geometry; pseudorandom function; strong key indistinguishability

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; ECONOMIC AND SOCIAL EFFECTS; FINITE ELEMENT METHOD; VECTORS;

EID: 84976264666     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2015.2479609     Document Type: Article
Times cited : (53)

References (36)
  • 2
    • 84858284080 scopus 로고    scopus 로고
    • Data storage auditing service in cloud computing: Challenges, methods and opportunities
    • K. Yang and X. Jia, "Data storage auditing service in cloud computing: Challenges, methods and opportunities," World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
    • (2012) World Wide Web , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2
  • 3
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1-11, 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 4
    • 84903121888 scopus 로고    scopus 로고
    • Expressive, efficient and revocable data access control for multi-authority cloud storage
    • Jul.
    • K. Yang and X. Jia, "Expressive, efficient and revocable data access control for multi-authority cloud storage," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735-1744, Jul. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.7 , pp. 1735-1744
    • Yang, K.1    Jia, X.2
  • 6
    • 84883325513 scopus 로고    scopus 로고
    • An efficient attribute-based encryption and access control scheme for cloud storage environment
    • J.-Y. Huang, C.-K. Chiang, and I.-E. Liao, "An efficient attribute-based encryption and access control scheme for cloud storage environment," in Proc. 8th Int. Conf. Grid Pervasive Comput., 2013, pp. 453-463.
    • (2013) Proc. 8th Int. Conf. Grid Pervasive Comput. , pp. 453-463
    • Huang, J.-Y.1    Chiang, C.-K.2    Liao, I.-E.3
  • 7
    • 84863392301 scopus 로고    scopus 로고
    • HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
    • Apr.
    • Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 8
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. 17th ACM Conf. Comput. Commun. Security, 2010, pp. 735-737.
    • (2010) Proc. 17th ACM Conf. Comput. Commun. Security , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 9
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 239-248, 1983.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 10
    • 39149132135 scopus 로고    scopus 로고
    • A secure group key management scheme for hierarchical mobile ad hoc networks
    • D. Huang and D. Medhi, "A secure group key management scheme for hierarchical mobile ad hoc networks," Ad Hoc Netw., vol. 6, no. 4, pp. 560-577, 2008.
    • (2008) Ad Hoc Netw. , vol.6 , Issue.4 , pp. 560-577
    • Huang, D.1    Medhi, D.2
  • 11
    • 84911091131 scopus 로고    scopus 로고
    • An efficient solution for hierarchical access control problem in cloud environment
    • B.-Z. He, C.-M. Chen, T.-Y. Wu, and H.-M. Sun, "An efficient solution for hierarchical access control problem in cloud environment," Math. Problems Eng., vol. 2014, p. 8, 2014.
    • (2014) Math. Problems Eng. , vol.2014 , pp. 8
    • He, B.-Z.1    Chen, C.-M.2    Wu, T.-Y.3    Sun, H.-M.4
  • 12
    • 84879364477 scopus 로고    scopus 로고
    • UCloud: A user-centric key management scheme for cloud data protection
    • Y.-W. Kao, K.-Y. Huang, H.-Z. Gu, and S.-M. Yuan, "uCloud: A user-centric key management scheme for cloud data protection," IET Inf. Security, vol. 7, no. 2, pp. 144-154, 2013.
    • (2013) IET Inf. Security , vol.7 , Issue.2 , pp. 144-154
    • Kao, Y.-W.1    Huang, K.-Y.2    Gu, H.-Z.3    Yuan, S.-M.4
  • 13
    • 84867371233 scopus 로고    scopus 로고
    • A secure hierarchical key management scheme in wireless sensor network
    • Y. Zhang, X. Li, J. Liu, J. Yang, and B. Cui, "A secure hierarchical key management scheme in wireless sensor network," Int. J. Distrib. Sensor Netw., vol. 2012, p. 8, 2012.
    • (2012) Int. J. Distrib. Sensor Netw. , vol.2012 , pp. 8
    • Zhang, Y.1    Li, X.2    Liu, J.3    Yang, J.4    Cui, B.5
  • 14
    • 84859873785 scopus 로고    scopus 로고
    • An efficient key management scheme for content access control for linear hierarchies
    • H. Ragab Hassen, H. Bettahar, A. Bouadbdallah, and Y. Challal, "An efficient key management scheme for content access control for linear hierarchies," Comput. Netw., vol. 56, no. 8, pp. 2107-2118, 2012.
    • (2012) Comput. Netw. , vol.56 , Issue.8 , pp. 2107-2118
    • Ragab Hassen, H.1    Bettahar, H.2    Bouadbdallah, A.3    Challal, Y.4
  • 15
    • 80052271043 scopus 로고    scopus 로고
    • Efficient provably-secure hierarchical key assignment schemes
    • A. D. Santis, A. L. Ferrara, and B. Masucci, "Efficient provably-secure hierarchical key assignment schemes," Theoretical Comput. Sci., vol. 412, no. 41, pp. 5684-5699, 2011.
    • (2011) Theoretical Comput. Sci. , vol.412 , Issue.41 , pp. 5684-5699
    • Santis, A.D.1    Ferrara, A.L.2    Masucci, B.3
  • 16
    • 60349128962 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, "Dynamic and efficient key management for access hierarchies," ACM Trans. Inf. Syst. Security, vol. 12, no. 3, article 18, pp. 1-43, 2009.
    • (2009) ACM Trans. Inf. Syst. Security , vol.12 , Issue.3 , pp. 1-43
    • Atallah, M.J.1    Blanton, M.2    Fazio, N.3    Frikken, K.B.4
  • 17
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • V. R. Shen and T.-S. Chen, "A novel key management scheme based on discrete logarithms and polynomial interpolations," Comput. Security, vol. 21, no. 2, pp. 164-171, 2002.
    • (2002) Comput. Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.1    Chen, T.-S.2
  • 18
    • 35948945322 scopus 로고    scopus 로고
    • A dynamic key management solution to access hierarchy
    • X. Zou, Y. Karandikar, and E. Bertino, "A dynamic key management solution to access hierarchy," Int. J. Netw. Manage., vol. 17, no. 6, pp. 437-450, 2007.
    • (2007) Int. J. Netw. Manage. , vol.17 , Issue.6 , pp. 437-450
    • Zou, X.1    Karandikar, Y.2    Bertino, E.3
  • 19
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • A. D. Santis, A. L. Ferrara, and B. Masucci, "Cryptographic key assignment schemes for any access control policy," Inf. Process. Lett., vol. 92, no. 4, pp. 199-205, 2004.
    • (2004) Inf. Process. Lett. , vol.92 , Issue.4 , pp. 199-205
    • Santis, A.D.1    Ferrara, A.L.2    Masucci, B.3
  • 20
    • 0344089052 scopus 로고    scopus 로고
    • A new key assignment scheme for enforcing complicated access control policies in hierarchy
    • I.-C. Lin, M.-S. Hwang, and C.-C. Chang, "A new key assignment scheme for enforcing complicated access control policies in hierarchy," Future Gener. Comput. Syst., vol. 19, no. 4, pp. 457-462, 2003.
    • (2003) Future Gener. Comput. Syst. , vol.19 , Issue.4 , pp. 457-462
    • Lin, I.-C.1    Hwang, M.-S.2    Chang, C.-C.3
  • 21
    • 43649095362 scopus 로고    scopus 로고
    • An efficient time-bound hierarchical key management scheme for secure broadcasting
    • Apr.-Jun.
    • E. Bertino, N. Shang, and S. S. Wagstaff, "An efficient time-bound hierarchical key management scheme for secure broadcasting," IEEE Trans. Dependable Secure Comput., vol. 5, no. 2, pp. 65-70, Apr.-Jun. 2008.
    • (2008) IEEE Trans. Dependable Secure Comput. , vol.5 , Issue.2 , pp. 65-70
    • Bertino, E.1    Shang, N.2    Wagstaff, S.S.3
  • 22
    • 34948898634 scopus 로고    scopus 로고
    • Access control in user hierarchy based on elliptic curve cryptosystem
    • Y. F. Chung, H. H. Lee, F. Lai, and T. S. Chen, "Access control in user hierarchy based on elliptic curve cryptosystem," Inf. Sci., vol. 178, no. 1, pp. 230-243, 2008.
    • (2008) Inf. Sci. , vol.178 , Issue.1 , pp. 230-243
    • Chung, Y.F.1    Lee, H.H.2    Lai, F.3    Chen, T.S.4
  • 23
    • 33745856988 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    • F.-G. Jeng and C.-M. Wang, "An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem," J. Syst. Softw., vol. 79, no. 8, pp. 1161-1167, 2006.
    • (2006) J. Syst. Softw. , vol.79 , Issue.8 , pp. 1161-1167
    • Jeng, F.-G.1    Wang, C.-M.2
  • 24
    • 79751531498 scopus 로고    scopus 로고
    • Secure key management scheme for dynamic hierarchical access control based on ECC
    • Y.-L. Lin and C.-L. Hsu, "Secure key management scheme for dynamic hierarchical access control based on ECC," J. Syst. Softw., vol. 84, no. 4, pp. 679-685, 2011.
    • (2011) J. Syst. Softw. , vol.84 , Issue.4 , pp. 679-685
    • Lin, Y.-L.1    Hsu, C.-L.2
  • 25
    • 84862699099 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
    • A. K. Das, N. R. Paul, and L. Tripathy, "Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem," Inf. Sci., vol. 209, pp. 80-92, 2012.
    • (2012) Inf. Sci. , vol.209 , pp. 80-92
    • Das, A.K.1    Paul, N.R.2    Tripathy, L.3
  • 26
    • 10444280844 scopus 로고    scopus 로고
    • A novel key management scheme for dynamic access control in a user hierarchy
    • T.-S. Chen and J.-Y. Huang, "A novel key management scheme for dynamic access control in a user hierarchy," Appl. Math. Comput., vol. 162, no. 1, pp. 339-351, 2005.
    • (2005) Appl. Math. Comput. , vol.162 , Issue.1 , pp. 339-351
    • Chen, T.-S.1    Huang, J.-Y.2
  • 27
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • Jan.
    • W.-G. Tzeng, "A time-bound cryptographic key assignment scheme for access control in a hierarchy," IEEE Trans. Knowl. Data Eng., vol. 14, no. 1, pp. 182-188, Jan. 2002.
    • (2002) IEEE Trans. Knowl. Data Eng. , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 28
    • 0041347682 scopus 로고    scopus 로고
    • Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    • Jul./Aug.
    • X. Yi and Y. Ye, "Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy," IEEE Trans. Knowl. Data Eng., vol. 15, no. 4, pp. 1054-1055, Jul./Aug. 2003.
    • (2003) IEEE Trans. Knowl. Data Eng. , vol.15 , Issue.4 , pp. 1054-1055
    • Yi, X.1    Ye, Y.2
  • 29
    • 84862218233 scopus 로고    scopus 로고
    • Provably-secure time-bound hierarchical key assignment schemes
    • G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, "Provably-secure time-bound hierarchical key assignment schemes," J. Cryptol., vol. 25, no. 2, pp. 243-270, 2012.
    • (2012) J. Cryptol. , vol.25 , Issue.2 , pp. 243-270
    • Ateniese, G.1    De Santis, A.2    Ferrara, A.L.3    Masucci, B.4
  • 31
  • 32
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
    • T.-S. Chen and Y.-F. Chung, "Hierarchical access control based on Chinese remainder theorem and symmetric algorithm," Comput. Security, vol. 21, no. 6, pp. 565-570, 2002.
    • (2002) Comput. Security , vol.21 , Issue.6 , pp. 565-570
    • Chen, T.-S.1    Chung, Y.-F.2
  • 33
    • 0038103896 scopus 로고    scopus 로고
    • Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
    • C.-L. Hsu and T.-S. Wu, "Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy," Comput. Security, vol. 22, no. 5, pp. 453-456, 2003.
    • (2003) Comput. Security , vol.22 , Issue.5 , pp. 453-456
    • Hsu, C.-L.1    Wu, T.-S.2
  • 34
    • 0038780901 scopus 로고    scopus 로고
    • A comment on the Chen-Chung scheme for hierarchical access control
    • S. Zhong and T. Lin, "A comment on the Chen-Chung scheme for hierarchical access control," Comput. Security, vol. 22, no. 5, pp. 450-452, 2003.
    • (2003) Comput. Security , vol.22 , Issue.5 , pp. 450-452
    • Zhong, S.1    Lin, T.2
  • 35
  • 36
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom functions revisited: The cascade construction and its concrete security
    • M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: The cascade construction and its concrete security," in Proc. 37th Annu. Symp. Found. Comput. Sci., 1996, pp. 514-523.
    • (1996) Proc. 37th Annu. Symp. Found. Comput. Sci. , pp. 514-523
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.