Outsourcing

Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios

Download Now Free registration required

Executive Summary

With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect information in this outsourcing scenario. However, existing approaches often limit dynamical update of access control policy, or have security weakness in practical use. In this paper, the authors propose a new solution to realize efficient access control of sensitive data service in outsourcing scenarios by using a new re-encryption execution model.

  • Format: PDF
  • Size: 179.6 KB