An Attribute-based Access Control with Flexible Attribute Change in Open Systems

被引:0
|
作者
Ye, Tao [1 ,2 ]
Cai, Yongquan [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
[2] Qinghai Univ Nationalities, Coll Comp, Xining 81007, Qinghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Access Control; Policies; Attribute Revocation; CP-ABE; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The confidentiality and usability of sensitive data in outsourcing processes are particularly important in open systems. When the user's attribute is revoked or restored in the CP-ABE system, the flexibility of the dynamic change of the corresponding strategy is a challenge. In the paper, we presents a CP-ABE access control scheme which supports the dynamic changes of policy attribute. We expanded its Access Structure Tree, established a full policy access control mechanism that supports the minimum shared re-encryption key attribute set, and realized the change of the flexible access policy in the scheme.
引用
收藏
页码:101 / 105
页数:5
相关论文
共 50 条
  • [1] PTaCL: A Language for Attribute-Based Access Control in Open Systems
    Crampton, Jason
    Morisset, Charles
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 390 - 409
  • [2] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [3] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [4] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [5] Attribute-Based Access Control of Collaborative design systems
    Fan, Tongrang
    Guo, Hongyong
    Li, Yanjing
    [J]. MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 80 - 85
  • [6] Current Research and Open Problems in Attribute-Based Access Control
    Servos, Daniel
    Osborn, Sylvia L.
    [J]. ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [7] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [8] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [9] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [10] An Attribute-Based Access Control using chaincode in RFID systems
    Figueroa, Santiago
    Anorga, Javier
    Arrizabalaga, Saioa
    Irigoyen, Inigo
    Monterde, Mario
    [J]. 2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,