期刊文献+

Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing

下载PDF
导出
摘要 In Cloud Computing, the application software and the databases are moved to large centralized data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings many new security challenges, which have not been well solved. Data access control is an effective way to ensure the big data security in the cloud. In this paper,we study the problem of fine-grained data access control in cloud computing.Based on CP-ABE scheme,we propose a novel access control policy to achieve fine-grainedness and implement the operation of user revocation effectively.The analysis results indicate that our scheme ensures the data security in cloud computing and reduces the cost of the data owner significantly.
出处 《国际计算机前沿大会会议论文集》 2015年第1期100-101,共2页 International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE)
基金 This research is supported by a grant from National Natural Science Foundation of China (No. 61170241, 61472097).This paper is funded by the International Exchange Program of Harbin Engineering University for Innovationoriented Talents Cultivation.
  • 相关文献

参考文献2

二级参考文献89

  • 1WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 4V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 5E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 6C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 7J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.
  • 8J Park,R Sandhu.The UCONABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 9D Q Zou,L G He,H Jin,et al.CRBAC:imposing multigrained constraints on the RBAC model in the multi-application environment[J].Journal of Network and Computer Applications,2009,32(2):402-411.
  • 10R Yang,C Lin,F Feng.A time and mutable attribute-based access control model[J].Journal of Computers,2009,4(6):510-518.

共引文献1142

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部