53 Scopus citations

Abstract

Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integrate data access policies within the encrypted data. However, little work has been done to explore temporal attributes in specifying and enforcing the data owner's policy and the data user's privileges in cloud-based environments. In this paper, we present an efficient temporal access control encryption scheme for cloud services with the help of cryptographic integer comparisons and a proxy-based re-encryption mechanism on the current time. We also provide a dual comparative expression of integer ranges to extend the power of attribute expression for implementing various temporal constraints. We prove the security strength of the proposed scheme and our experimental results not only validate the effectiveness of our scheme, but also show that the proposed integer comparison scheme performs significantly better than previous bitwise comparison scheme.

Original languageEnglish (US)
Title of host publication2012 Proceedings IEEE INFOCOM, INFOCOM 2012
Pages2576-2580
Number of pages5
DOIs
StatePublished - Jun 4 2012
EventIEEE Conference on Computer Communications, INFOCOM 2012 - Orlando, FL, United States
Duration: Mar 25 2012Mar 30 2012

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X

Other

OtherIEEE Conference on Computer Communications, INFOCOM 2012
CountryUnited States
CityOrlando, FL
Period3/25/123/30/12

Keywords

  • Cloud Computing
  • Cryptography
  • Integer Comparison
  • Re-Encryption
  • Temporal Access Control

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Towards temporal access control in cloud computing'. Together they form a unique fingerprint.

  • Cite this

    Zhu, Y., Hu, H., Ahn, G-J., Huang, D., & Wang, S. (2012). Towards temporal access control in cloud computing. In 2012 Proceedings IEEE INFOCOM, INFOCOM 2012 (pp. 2576-2580). [6195656] (Proceedings - IEEE INFOCOM). https://doi.org/10.1109/INFCOM.2012.6195656