An efficient solution for hierarchical access control problem in cloud environment (Q1718671): Difference between revisions
From MaRDI portal
Created a new Item |
ReferenceBot (talk | contribs) Changed an Item |
||
(5 intermediate revisions by 5 users not shown) | |||
Property / Wikidata QID | |||
Property / Wikidata QID: Q59066087 / rank | |||
Normal rank | |||
Property / describes a project that uses | |||
Property / describes a project that uses: jPBC / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1155/2014/569397 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1973925717 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Cryptographic key assignment schemes for any access control policy / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New constructions for provably-secure time-bound hierarchical key assignment schemes / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 02:31, 18 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | An efficient solution for hierarchical access control problem in cloud environment |
scientific article |
Statements
An efficient solution for hierarchical access control problem in cloud environment (English)
0 references
8 February 2019
0 references
Summary: The time-bound hierarchical key assignment scheme provides a cryptographic solution for the access control problem in distributed systems (e.g., Pay-TV and cloud computing applications). Most time-bound hierarchical key assignment schemes can be divided into two types: adopting tamper-resistant devices and utilizing public values. Despite the fact that adopting tamper-resistant devices can easily resist to collusion attacks, utilizing public values is much cheaper and more suitable for cloud environment. In this paper, we proposed a new time-bound hierarchical key assignment scheme, which can effectively defeat the collusion attack. Besides, the proposed scheme utilizes public values instead of tamper-resistant devices, which will restrict user's convenience. Compared with the previous works, our scheme requires fewer public values and has better performance.
0 references