A novel temporal access control scheme for outsourced data in cloud with user revocation
by P.G. Shynu; K. John Singh
Electronic Government, an International Journal (EG), Vol. 13, No. 3, 2017

Abstract: E-governance can be implemented very effectively using the cloud computing technologies. Security and privacy of data are the major challenges in cloud-based e-governance systems. With proper access control and user revocation schemes, we can protect the privacy and security of data stored in cloud servers used for e-governance. There are a lot of techniques to achieve the controlled access in cloud computing. In some applications of e-government, the users should be allowed to access data, only for a specific period of time. In this paper, we introduce a temporal access control scheme based on attribute-based encryption (ABE), which allows users to access the data according to their access policy and for a specific time period only. Our model includes both the temporal access scheme and a time-based proxy re-encryption scheme to allow a user's access right to expire automatically.

Online publication date: Mon, 18-Sep-2017

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the Electronic Government, an International Journal (EG):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com