A Cloud-Based Access Control Scheme with User Revocation and Attribute Update

Author(s):  
Peng Zhang ◽  
Zehong Chen ◽  
Kaitai Liang ◽  
Shulan Wang ◽  
Ting Wang
Author(s):  
Mrs. B. Sathyabama ◽  
C. SureshKumar ◽  
K. Kesau ◽  
R. Karthikeyan

The paper proposes a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme are decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Zhen Qin ◽  
Jianfei Sun ◽  
Dajiang Chen ◽  
Hu Xiong

Online healthcare social networks (OHSNs) play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT). Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE) features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.


Author(s):  
Asmidar Abu Bakar ◽  
Roslan Ismail ◽  
Abdul Rahim Ahmad ◽  
Jamalul-lail Abdul Manan ◽  
Jamilin Jais

2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Sign in / Sign up

Export Citation Format

Share Document