Paper 2010/242

Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios

Yang ZHANG and Jun-Liang CHEN

Abstract

With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect information in this outsourcing scenario. However, existing approaches often limit dynamical update of access control policy, or have security weakness in practical use. In this paper, we propose a new solution to realize efficient access control of sensitive data service in outsourcing scenarios by using a new re-encryption execution model. Our solution realizes selective access control, dynamical policy updating, simple key management, and collusion prevention of the outsourcee and customers. We also give some proofs of our implementation.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Unknown where it was published
Keywords
Data OutsourcingRe-encryption SchemeAccess ControlIdentity Metasystem
Contact author(s)
YangZhang @ bupt edu cn
History
2010-05-02: received
Short URL
https://ia.cr/2010/242
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/242,
      author = {Yang ZHANG and Jun-Liang CHEN},
      title = {Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios},
      howpublished = {Cryptology ePrint Archive, Paper 2010/242},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/242}},
      url = {https://eprint.iacr.org/2010/242}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.