An Authorized Identity Authentication-based Data Access Control Scheme in Cloud

被引:0
|
作者
Shen, Jian [1 ]
Liu, Dengzhi [1 ]
Liu, Qi [1 ]
Wang, Baowei [1 ]
Fu, Zhangjie [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
关键词
Cloud computing; access control; user authentication; security; authorized agency;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud computing is a newfound service which has a rapid growth in IT industry recent years. Despite it has a huge contribution to the development of the technology and society, the cloud still exists some security deficiencies to block its development such as data leakage, illegal access and privacy risks. Hence, access control and user authentication is very important in cloud environment. Some related access control schemes has been proposed to solve the security problems in cloud, however, the high computation cost is a crucial factor in practical use. In this paper we propose a novel lightweight identity authenticationbased access control scheme for cloud, due to adopt an authorized agency to assist the authentication and key distribution, this scheme is more efficient and practical than the related work.
引用
收藏
页码:56 / 60
页数:5
相关论文
共 50 条
  • [1] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02) : 254 - 259
  • [2] A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications
    Said, Wael
    Mostafa, Elsayed
    Hassan, M. M.
    Mostafa, Ayman Mohamed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 3193 - 3209
  • [3] Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services Authorized Access to Healthcare Services
    Dharminder, Dharminder
    Mishra, Dheerendra
    Li, Xiong
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2020, 44 (01)
  • [4] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [5] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    K. N. Pallavi
    V. Ravi Kumar
    [J]. Wireless Personal Communications, 2021, 116 : 3039 - 3060
  • [6] Access authentication scheme based on authorized certificate in wireless mesh networks
    Luan, Liangyu
    Fu, Yingfang
    Xiao, Peng
    [J]. Journal of Networks, 2014, 9 (01) : 231 - 237
  • [7] Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search
    Saraswathy, K. S.
    Sujatha, S. S.
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2022, 13 (07) : 569 - 575
  • [8] Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService
    Park, Hyun-A
    Hong, Jong Wook
    Park, Jae Hyun
    Zhan, Justin
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (06) : 824 - 837
  • [9] Ransomware Prevention using Application Authentication-Based File Access Control
    Ami, Or
    Elovici, Yuval
    Hendler, Danny
    [J]. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1610 - 1619
  • [10] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    [J]. 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986