Attribute-Based Access Control for Vehicular Edge Cloud Computing

Author(s):  
Cheng-Yu Cheng ◽  
Hang Liu ◽  
Li-Tse Hsieh ◽  
Edward Colbert ◽  
Jin-Hee Cha
2016 ◽  
Vol 10 (4) ◽  
pp. 44-57 ◽  
Author(s):  
Azin Moradbeikie ◽  
Saied Abrishami ◽  
Hasan Abbasi

Nowadays, Cloud Computing is considered one of the important fields in both research and industry. Users enjoy membership of cloud providing effective services called time-limited services. This paper addresses time-limited services offering an attribute-based access control method and time-limited attributes providing users' time-limited membership in cloud service. The proposed method authenticates users for specific time limit after which they are considered invalid. This method is decentralized resistible against backward and forward attacks. Moreover, this approach compared to other approaches reduces calculation and communication overhead.


2013 ◽  
Vol 475-476 ◽  
pp. 1144-1149
Author(s):  
Xian Yong Meng ◽  
Zhong Chen ◽  
Xiang Yu Meng

In this paper, a novel decentralized key-policy attribute-based signcryption (ABS) scheme is proposed, where each authority can generate secret-public key pair for the user independently without any cooperation and a centralized authority. In the proposed scheme, each authority can join or leave the system randomly without reinitializing the system,and issue secret-public keys to user respectively. Therefore, it is clear that the multi-authority attribute-based access control scheme can reduce the communication cost and the collaborative computing cost. Additionally, the attribute-based signcryption scheme is efficient in terms of both the identification authentication and the confidential communication, and can realize security secret sharing in cloud computing environments.


2017 ◽  
Vol 5 (4) ◽  
pp. 617-627 ◽  
Author(s):  
Wei Teng ◽  
Geng Yang ◽  
Yang Xiang ◽  
Ting Zhang ◽  
Dongyang Wang

2021 ◽  
Author(s):  
Shadha Mohamed Sulaiyam ALAmri

Cybersecurity is a critical issue as the world is moving towered IR4 era (Industrial Revaluation 4.0) where technology is involved, and access to the internet is an imperative need. The traditional computing systems are not able to meet the huge computing demand and growing data (Big-Data). Therefore; new technologies have been evolved such as cloud computing. This chapter is exploring the need for a dynamic access control approach to enhance the Cybersecurity. The scope in this chapter is focusing on IaaS (Infrastructure as a Service) layer of cloud computing. The research approach aims to enhance the basic ABAC (Attribute-Based Access Control) model by adding a context-aware feature and SoD principle. The enhanced model called ABACsh. This proposed enhancement is implemented through a framework based on AI (Artificial Intelligent) to meet the requirements of dynamic systems. The framework is tested in the OpenStack testbed. The results show better performance in the term of computation speed.


Sign in / Sign up

Export Citation Format

Share Document