Authors: Xinfeng Ye; Bakh Khoussainov
Addresses: Department of Computer Science, The University of Auckland, Auckland, New Zealand ' Department of Computer Science, The University of Auckland, Auckland, New Zealand
Abstract: Fine-grained access control schemes are commonly used in cloud computing. In this type of schemes, each data item is given its own access control policy. The entity that wants to access the data item needs to provide its credentials to a policy enforcer. In a cloud environment, normally, the policy enforcer is not the owner of the data. The access control policies and the credentials might reveal some information that the policy enforcer is not entitled to know. This paper proposes a fine-grained access control scheme. It prevents the policy enforcers from comprehending the access control policies and the entities' credentials by using cryptographic techniques. Compared with the existing schemes, the proposed scheme provides higher level privacy.
Keywords: fine-grained access control; cloud computing; cryptography; hidden policy; hidden credentials; cloud manufacturing; cloud security.
International Journal of Grid and Utility Computing, 2013 Vol.4 No.2/3, pp.160 - 168
Received: 24 Aug 2012
Accepted: 23 Sep 2012
Published online: 18 Sep 2014 *