Paper 2010/242
Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
Yang ZHANG and Jun-Liang CHEN
Abstract
With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect information in this outsourcing scenario. However, existing approaches often limit dynamical update of access control policy, or have security weakness in practical use. In this paper, we propose a new solution to realize efficient access control of sensitive data service in outsourcing scenarios by using a new re-encryption execution model. Our solution realizes selective access control, dynamical policy updating, simple key management, and collusion prevention of the outsourcee and customers. We also give some proofs of our implementation.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Data OutsourcingRe-encryption SchemeAccess ControlIdentity Metasystem
- Contact author(s)
- YangZhang @ bupt edu cn
- History
- 2010-05-02: received
- Short URL
- https://ia.cr/2010/242
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/242, author = {Yang ZHANG and Jun-Liang CHEN}, title = {Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/242}, year = {2010}, url = {https://eprint.iacr.org/2010/242} }