File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TC.2014.2366741
- Scopus: eid_2-s2.0-84939245573
- WOS: WOS:000359236500014
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: k-Times Attribute-Based Anonymous Access Control for Cloud Computing
Title | k-Times Attribute-Based Anonymous Access Control for Cloud Computing |
---|---|
Authors | |
Keywords | cloud computing attribute-based anonymous access k-times |
Issue Date | 2015 |
Citation | IEEE Transactions on Computers, 2015, v. 64, n. 9, p. 2595-2608 How to Cite? |
Abstract | © 1968-2012 IEEE. In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period or an event. Further additional access will be denied. We also prove the security of our instantiation. Our implementation result shows that our scheme is practical. |
Persistent Identifier | http://hdl.handle.net/10722/260214 |
ISSN | 2023 Impact Factor: 3.6 2023 SCImago Journal Rankings: 1.307 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yuen, Tsz Hon | - |
dc.contributor.author | Liu, Joseph K. | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Huang, Xinyi | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Zhou, Jianying | - |
dc.date.accessioned | 2018-09-12T02:00:47Z | - |
dc.date.available | 2018-09-12T02:00:47Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | IEEE Transactions on Computers, 2015, v. 64, n. 9, p. 2595-2608 | - |
dc.identifier.issn | 0018-9340 | - |
dc.identifier.uri | http://hdl.handle.net/10722/260214 | - |
dc.description.abstract | © 1968-2012 IEEE. In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period or an event. Further additional access will be denied. We also prove the security of our instantiation. Our implementation result shows that our scheme is practical. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Computers | - |
dc.subject | cloud computing | - |
dc.subject | attribute-based | - |
dc.subject | anonymous access | - |
dc.subject | k-times | - |
dc.title | k-Times Attribute-Based Anonymous Access Control for Cloud Computing | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TC.2014.2366741 | - |
dc.identifier.scopus | eid_2-s2.0-84939245573 | - |
dc.identifier.volume | 64 | - |
dc.identifier.issue | 9 | - |
dc.identifier.spage | 2595 | - |
dc.identifier.epage | 2608 | - |
dc.identifier.isi | WOS:000359236500014 | - |
dc.identifier.issnl | 0018-9340 | - |