Title: Cooperative attribute-based access control for enterprise computing system

Authors: Mengting Li; Xinyi Huang; Joseph K. Liu; Li Xu; Wei Wu

Addresses: Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China ' Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China ' Infocomm Security Department, Institute for Infocomm Research, Singapore ' Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China ' Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China

Abstract: In this paper we introduce a cooperative attribute-based access control mechanism, which is specifically designed for enterprise computing systems. In our system, users are divided into different groups and they are affiliated with different attributes. Only members from the same group can combine their signing keys to form the signing key of a larger union set of attributes, but users from different groups cannot make it. With the union of the attributes, users can generate a signature which can be used to grant access right to the enterprise cloud system. The applications range from private cloud of a small and medium enterprise (SME) to a large public cloud of electronic healthcare system. We give an efficient design of this mechanism, formally prove its security and implement the prototype of our scheme.

Keywords: enterprise computing; access control; cloud computing; signature; formal security; cooperative attributes; signing keys; small and medium-sized enterprises; SMEs; electronic healthcare; e-healthcare.

DOI: 10.1504/IJES.2015.072364

International Journal of Embedded Systems, 2015 Vol.7 No.3/4, pp.191 - 202

Received: 09 Jul 2014
Accepted: 10 Sep 2014

Published online: 11 Oct 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article