2012 Proceedings IEEE INFOCOM 2012
DOI: 10.1109/infcom.2012.6195656
|View full text |Cite
|
Sign up to set email alerts
|

Towards temporal access control in cloud computing

Abstract: Abstract-Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integrate data access policies within the encrypted data. However, little work has been done to explore temporal attributes in specifying and enforcing the data owner's policy and the data user's privileges in cloud-based environments. In this paper, we present an efficient temporal access control encryption scheme for cloud services… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(26 citation statements)
references
References 14 publications
0
25
0
1
Order By: Relevance
“…Cloud computing endure a number of security issues, for instance, data access control [65], data distribution over a distributed infrastructure, data integrity, service availability, and secure communication. Also, the mobility adds some additional security issues [66], [67] that make mobile cloud security more challenging.…”
Section: G Securitymentioning
confidence: 99%
“…Cloud computing endure a number of security issues, for instance, data access control [65], data distribution over a distributed infrastructure, data integrity, service availability, and secure communication. Also, the mobility adds some additional security issues [66], [67] that make mobile cloud security more challenging.…”
Section: G Securitymentioning
confidence: 99%
“…Attribute-based access control provides a flexible approach that allows data owners to integrate data access policies within the encrypted data. So in this [4] Yan Zhu * , Hongxin Hu †, Gail-Joon Ahn †, Dijiang Huang †, and Shanbiao Wang discussed present an efficient temporal access control encryption scheme for cloud services with the help of cryptographic integer comparisons and a proxy-based reencryption mechanism on the current time. We also provide a dual comparative expression of integer ranges to extend the power of attribute expression for implementing various temporal constraints.…”
Section: Review Of Literaturementioning
confidence: 99%
“…The main idea of fine-grained encryption derived from multi-level encryption [12][13][14] and fine-grained access control technology [15][16][17] in the field of database. In our paper [9], we proposed the fine-grained encryption method due to the entire encryption brings too much operation of big data processing in IoT.…”
Section: Related Workmentioning
confidence: 99%