FACOR: Flexible Access Control with Outsourceable Revocation in Mobile Clouds

来源 :中国通信 | 被引量 : 0次 | 上传用户:ncepuwade
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile devices. However, less attention has been paid to the efficiency of revocation when there are mobile devices needed to be revoked. In this paper, we put forward a new solution, referred to as flexible access control with outsourceable revocation(FACOR) for mobile clouds. The FACOR applies the attribute-based encryption to enable flexible access control on outsourced data, and allows mobile users to outsource the time-consuming encryption and decryption computations to proxies, with only requiring attributes authorization to be fully trusted. As an advantageous feature, FACOR provides an outsourceable revocation for mobile users to reduce the complicated attribute-based revocation operations. The security analysis shows that our FACOR scheme achieves data security against collusion attacks and unauthorized accesses from revoked users. Both theoretical and experimental results confirm that our proposed scheme greatly reliefs the mobile devices from heavy encryption and decryption computations, as well as the complicated revocation of access rights in mobile clouds. Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile devices. However, less attention has been paid to the efficiency of revocation when there are mobile devices needed to be revoked. In this paper, we put forward a new solution, referred to as flexible access control with outsourceable revocation (FACOR) for mobile clouds. The FACOR applies the attribute-based encryption to enable flexible access control on outsourced data, and allows mobile users to outsource the time-consuming encryption and decryption computations to proxies, with only requiring attributes authorization to be fully trusted. As an advantageous feature, FACOR provides an outsourceable revocation for mobile users to reduce the complicated attribute-based revocation operations. The security analysis shows that our our FACOR scheme achieves data security against co Both theoretical and experimental results confirm that our proposed scheme greatly reliefs the mobile devices from heavy encryption and decryption computations, as well as the complicated revocation of access rights in mobile clouds.
其他文献
In this paper,we propose a non-cooperative differential game theory based resource allocation approach for the network security risk assessment.For the risk ass
本文通过对荣华二采区10
期刊
在显微镜下观察和认识真菌各种不同的孢子及菌丝的生长状态及形态结构是微生物真菌实验教学的一个重要内容.其标本制作的好坏直接关系到教学的效果.真菌小培养直接观察法由于
期刊
寫作背后·多一点了解  我们辉辉老师是一个很阳光活泼的人,我们都非常喜欢她的课。每次上课她都带我们先“嗨皮”一下,让我们这群调皮的小猴子乖乖听话,让我们在玩中思考、总结,获得知识,体悟人生的道理。《调皮的饼干》,就是在玩儿中收获的—篇作文。(陈雨佳)
期刊
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
期刊
神经源性异位骨化(neurogenic heterotopic ossification,NHO)是在中枢神经损伤患者的关节周围原本不存在骨的部位有新生骨的形成.NHO多发生在颅脑外伤或脊髓损伤的患者,部位
高尔基曾说:“开头第一句是最难的,好像音乐里的定调一样,往往要费好长时间才能找到它。”其实,不妨细读课文,一位位智者正用文字在教我们如何写呢。一、开门见山,直截了当《
微创手术追求的是以最小的创伤达到最好的手术效果.在过去十年中,随着影像技术的发展,特殊手术器械与设备的不断更新,人们对健康、审美的要求提高,共同推动着微创脊柱外科手
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
期刊