Cryptology ePrint Archive: Report 2010/242

Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios

Yang ZHANG and Jun-Liang CHEN

Abstract: With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect information in this outsourcing scenario. However, existing approaches often limit dynamical update of access control policy, or have security weakness in practical use. In this paper, we propose a new solution to realize efficient access control of sensitive data service in outsourcing scenarios by using a new re-encryption execution model. Our solution realizes selective access control, dynamical policy updating, simple key management, and collusion prevention of the outsourcee and customers. We also give some proofs of our implementation.

Category / Keywords: applications / Data Outsourcing, Re-encryption Scheme, Access Control, Identity Metasystem

Date: received 29 Apr 2010

Contact author: YangZhang at bupt edu cn

Available format(s): PDF | BibTeX Citation

Version: 20100502:165131 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]