Cryptology ePrint Archive: Report 2010/242
Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
Yang ZHANG and Jun-Liang CHEN
Abstract: With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect information in this outsourcing scenario. However, existing approaches often limit dynamical update of access control policy, or have security weakness in practical use. In this paper, we propose a new solution to realize efficient access control of sensitive data service in outsourcing scenarios by using a new re-encryption execution model. Our solution realizes selective access control, dynamical policy updating, simple key management, and collusion prevention of the outsourcee and customers. We also give some proofs of our implementation.
Category / Keywords: applications / Data Outsourcing, Re-encryption Scheme, Access Control, Identity Metasystem
Date: received 29 Apr 2010
Contact author: YangZhang at bupt edu cn
Available format(s): PDF | BibTeX Citation
Version: 20100502:165131 (All versions of this report)
Short URL: ia.cr/2010/242
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]