메뉴 건너뛰기




Volumn 5, Issue 3, 2017, Pages 485-498

Flexible Data Access Control Based on Trust and Reputation in Cloud Computing

Author keywords

access control; cloud computing; reputation; Trust

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DIGITAL STORAGE; NETWORK FUNCTION VIRTUALIZATION; TRUSTED COMPUTING;

EID: 85030113648     PISSN: None     EISSN: 21687161     Source Type: Journal    
DOI: 10.1109/TCC.2015.2469662     Document Type: Article
Times cited : (129)

References (39)
  • 1
    • 74049093526 scopus 로고    scopus 로고
    • Controlling data in the cloud: Outsourcing computation without outsourcing control
    • R. Chow et al., "Controlling data in the cloud: Outsourcing computation without outsourcing control, " in Proc. ACM Workshop Cloud Comput. Security, 2009, pp. 85-90.
    • (2009) Proc. ACM Workshop Cloud Comput. Security , pp. 85-90
    • Chow, R.1
  • 3
    • 84861623252 scopus 로고    scopus 로고
    • Efficient information retrieval for ranked queries in cost-effective cloud environments
    • Q. Liu, C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments, " in Proc. IEEE INFOCOM, 2012, pp. 2581-2585.
    • (2012) Proc. IEEE INFOCOM , pp. 2581-2585
    • Liu, Q.1    Tan, C.2    Wu, J.3    Wang, G.4
  • 4
    • 85033460636 scopus 로고    scopus 로고
    • Plutus: Scalable secure file sharing on untrusted storage
    • M. Kallahalla et al., "Plutus: Scalable secure file sharing on untrusted storage, " in Proc. USENIX Conf. File Storage Technol, 2003, pp. 29-42.
    • (2003) Proc. USENIX Conf. File Storage Technol , pp. 29-42
    • Kallahalla, M.1
  • 13
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing, " in Proc. IEEE INFOCOM, 2010, pp. 534-542.
    • (2010) Proc. IEEE INFOCOM , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 14
    • 79960839401 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    • G. Wang, Q. Liu, J. Wu, and M. Guo, "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers, " Computers Security, vol. 30, no. 5, pp. 320-331, 2011.
    • (2011) Computers Security , vol.30 , Issue.5 , pp. 320-331
    • Wang, G.1    Liu, Q.2    Wu, J.3    Guo, M.4
  • 18
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, " in Proc. 17th ACM Conf. Comput. Commun. Security, 2010, pp. 735-737.
    • (2010) Proc. 17th ACM Conf. Comput. Commun. Security , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 19
    • 84856182942 scopus 로고    scopus 로고
    • Piracy-preserved access control for cloud computing
    • M. Zhou, Y. Mu, W. Susilo, and J. Yan, "Piracy-preserved access control for cloud computing, " in Proc. IEEE TrustCom11, 2011, pp. 83-90.
    • (2011) Proc. IEEE TrustCom11 , pp. 83-90
    • Zhou, M.1    Mu, Y.2    Susilo, W.3    Yan, J.4
  • 21
  • 22
    • 84863392301 scopus 로고    scopus 로고
    • HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing
    • Apr.
    • Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 23
    • 84875211673 scopus 로고    scopus 로고
    • A practical reputation system for pervasive social chatting
    • Z. Yan, Y. Chen, and Y. Shen, "A practical reputation system for pervasive social chatting, " Comput. Syst. Sciences, vol. 79, no. 5, pp. 556-572, 2013.
    • (2013) Comput. Syst. Sciences , vol.79 , Issue.5 , pp. 556-572
    • Yan, Z.1    Chen, Y.2    Shen, Y.3
  • 26
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Feb.
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1-30, Feb. 2006.
    • (2006) ACM Trans. Inf. Syst. Security , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 27
    • 85030107050 scopus 로고    scopus 로고
    • Pairing-Based Cryptography (PBC) library
    • Pairing-Based Cryptography (PBC) library [Online]. Available: http://crypto. stanford. edu/pbc/, 2014.
    • (2014)
  • 28
    • 84866619747 scopus 로고    scopus 로고
    • Secure overlay cloud storage with access control and assured deletion
    • Nov. / Dec.
    • Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, "Secure overlay cloud storage with access control and assured deletion, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 6, pp. 903-916, Nov. / Dec. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput. , vol.9 , Issue.6 , pp. 903-916
    • Tang, Y.1    Lee, P.P.C.2    Lui, J.C.S.3    Perlman, R.4
  • 30
    • 84947486854 scopus 로고    scopus 로고
    • Controlling cloud data access based on reputation
    • Springer
    • Z. Yan, X. Li, and R. Kantola, "Controlling Cloud Data Access Based on Reputation, " Mobile Netw. Appl., Springer, 2015, Doi: 10. 1007/s11036-015-0591-6.
    • (2015) Mobile Netw. Appl.
    • Yan, Z.1    Li, X.2    Kantola, R.3
  • 31
    • 84888352650 scopus 로고    scopus 로고
    • Achieving secure role-based access control on encrypted data in cloud storage
    • Dec.
    • L. Zhou, V. Varadharajan, and M. Hitchens, "Achieving secure role-based access control on encrypted data in cloud storage, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1947-1960, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 1947-1960
    • Zhou, L.1    Varadharajan, V.2    Hitchens, M.3
  • 32
  • 34
    • 84886084180 scopus 로고    scopus 로고
    • Design role-based multi-tenancy access control scheme for cloud services
    • S. Yang, P. Lai, and J. Lin, "Design role-based multi-tenancy access control scheme for cloud services, " in Proc. Int. Symp. Biometrics Security Technol., 2013, pp. 273-279.
    • (2013) Proc. Int. Symp. Biometrics Security Technol. , pp. 273-279
    • Yang, S.1    Lai, P.2    Lin, J.3
  • 35
    • 84887982439 scopus 로고    scopus 로고
    • Enabling dynamic data and indirect mutual trust for cloud computing storage systems
    • Dec.
    • A. Barsoum and A. Hasan, "Enabling dynamic data and indirect mutual trust for cloud computing storage systems, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 12, pp. 2375-2385, Dec. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.12 , pp. 2375-2385
    • Barsoum, A.1    Hasan, A.2
  • 36
    • 84903708116 scopus 로고    scopus 로고
    • MTBAC: A mutual trust based access control model in cloud computing
    • G. Lin, D. Wang, Y. Bie, and M. Lei, "MTBAC: A mutual trust based access control model in cloud computing, " China Commun., vol. 11, no. 4, pp. 154-162, 2014.
    • (2014) China Commun. , vol.11 , Issue.4 , pp. 154-162
    • Lin, G.1    Wang, D.2    Bie, Y.3    Lei, M.4
  • 37
    • 84886903289 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multiauthority cloud storage systems
    • Nov.
    • K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, "DAC-MACS: Effective data access control for multiauthority cloud storage systems, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1790-1801, Nov. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.11 , pp. 1790-1801
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4    Xie, R.5
  • 38
    • 84907207994 scopus 로고    scopus 로고
    • An anonymous end-to-end communication protocol for mobile cloud environments
    • Jul.-Sep.
    • C. Ardagna, M. Conti, M. Leone, and J. Stefa, "An anonymous end-to-end communication protocol for mobile cloud environments, " IEEE Trans. Services Comput., vol. 7, no. 3, pp. 373-386, Jul.-Sep. 2014.
    • (2014) IEEE Trans. Services Comput. , vol.7 , Issue.3 , pp. 373-386
    • Ardagna, C.1    Conti, M.2    Leone, M.3    Stefa, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.