An efficient solution for hierarchical access control problem in cloud environment (Q1718671): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1155/2014/569397 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1973925717 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic key assignment schemes for any access control policy / rank
 
Normal rank
Property / cites work
 
Property / cites work: New constructions for provably-secure time-bound hierarchical key assignment schemes / rank
 
Normal rank

Latest revision as of 02:31, 18 July 2024

scientific article
Language Label Description Also known as
English
An efficient solution for hierarchical access control problem in cloud environment
scientific article

    Statements

    An efficient solution for hierarchical access control problem in cloud environment (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    8 February 2019
    0 references
    Summary: The time-bound hierarchical key assignment scheme provides a cryptographic solution for the access control problem in distributed systems (e.g., Pay-TV and cloud computing applications). Most time-bound hierarchical key assignment schemes can be divided into two types: adopting tamper-resistant devices and utilizing public values. Despite the fact that adopting tamper-resistant devices can easily resist to collusion attacks, utilizing public values is much cheaper and more suitable for cloud environment. In this paper, we proposed a new time-bound hierarchical key assignment scheme, which can effectively defeat the collusion attack. Besides, the proposed scheme utilizes public values instead of tamper-resistant devices, which will restrict user's convenience. Compared with the previous works, our scheme requires fewer public values and has better performance.
    0 references

    Identifiers