Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/31234
Title: k-Times Attribute-Based Anonymous Access Control for Cloud Computing
Authors: Yuen, TH
Liu, JK
Au, MH 
Huang, X
Susilo, W
Zhou, J
Keywords: Anonymous access
Attribute-based
cloud computing
K-times
Issue Date: 2015
Publisher: Institute of Electrical and Electronics Engineers
Source: IEEE transactions on computers, 2015, v. 64, no. 9, p. 2595-2608 How to cite?
Journal: IEEE transactions on computers 
Abstract: In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period or an event. Further additional access will be denied. We also prove the security of our instantiation. Our implementation result shows that our scheme is practical.
URI: http://hdl.handle.net/10397/31234
ISSN: 0018-9340
EISSN: 1557-9956
DOI: 10.1109/TC.2014.2366741
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

2
Last Week
0
Last month
0
Citations as of Aug 10, 2017

WEB OF SCIENCETM
Citations

2
Last Week
0
Last month
0
Citations as of Aug 15, 2017

Page view(s)

54
Last Week
4
Last month
Checked on Aug 13, 2017

Google ScholarTM

Check

Altmetric



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.