The full text of this article
Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption
by Naîma Meddah; Ahmed Toumanari
International Journal of Cloud Computing (IJCC), Vol. 5, No. 3, 2016
Abstract: Cloud computing is an emerging paradigm that provide technology and computer resources as a service. However due to data outsourcing and untrusted cloud servers, the data privacy and data access control becomes a challenging issues in cloud computing. In this paper, we propose a fine-grained access control system using a combination of key-policy attribute-based encryption system and an anonymous proxy reencryption, this proposed scheme is an efficient model that enforcing access policies based on data attributes, allowing the delegation of computation implicated in fine-grained access control to untrusted cloud servers without disclosing the data content. Previous schemes that use (KP-ABE) and proxy reencryption, leave how to be secure against chosen-cipher-text attacks (CCAs) as an open problem. The new scheme supports attribute-based encryption with anonymous proxy re-encryption. Our scheme is CCA secure, and secret key security is guaranteed, which is not provided by the current work.
Online publication date: Thu, 27-Oct-2016
is only available to individual subscribers or to users at subscribing institutions.
Go to Inderscience Online Journals to access the Full Text of this article.
Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.
Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Cloud Computing (IJCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable).
See our Orders page to subscribe.
If you still need assistance, please email email@example.com