LABAC: A Location-Aware Attribute-Based Access Control Scheme for Cloud Storage

Author(s):  
Yingjie Xue ◽  
Jianan Hong ◽  
Wei Li ◽  
Kaiping Xue ◽  
Peilin Hong
2011 ◽  
Vol 2 (3) ◽  
pp. 22-37 ◽  
Author(s):  
Roel Peeters ◽  
Dave Singelée ◽  
Bart Preneel

Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of or fewer compromised user’s devices, with being an adjustable threshold number. It removes the single point of failure in the system, as access is granted when one carries any set of user’s devices. Additionally it supports user-centered management, since users can alter the set of personal devices and can adjust the security parameters of the access control scheme towards their required level of security and reliability.


2019 ◽  
Vol 1228 ◽  
pp. 012018
Author(s):  
Kothapalli Chaitanya Deepthi ◽  
Dasari Ashok ◽  
M Krishna

2013 ◽  
Vol 475-476 ◽  
pp. 1144-1149
Author(s):  
Xian Yong Meng ◽  
Zhong Chen ◽  
Xiang Yu Meng

In this paper, a novel decentralized key-policy attribute-based signcryption (ABS) scheme is proposed, where each authority can generate secret-public key pair for the user independently without any cooperation and a centralized authority. In the proposed scheme, each authority can join or leave the system randomly without reinitializing the system,and issue secret-public keys to user respectively. Therefore, it is clear that the multi-authority attribute-based access control scheme can reduce the communication cost and the collaborative computing cost. Additionally, the attribute-based signcryption scheme is efficient in terms of both the identification authentication and the confidential communication, and can realize security secret sharing in cloud computing environments.


Sign in / Sign up

Export Citation Format

Share Document