CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing

Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while considering the specific features of cloud services. The specific features include great quantity of outsourced data, large number of users, honest-but-curious cloud servers, frequently changed user set, dynamic access control policies, and data accessing for light-weight mobile devices. This paper ad-dresses a cryptographic key assignment problem for enforcing a hierarchical access control policy over cloud data. The authors propose a new hierarchical key assignment scheme CloudHKA that observes the Bell-LaPadula security model and efficiently deals with the user revocation issue practically.

Provided by: National Chiao Tung University Topic: Cloud Date Added: Apr 2013 Format: PDF

Download Now

Find By Topic