Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/95605
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorQi, Sen_US
dc.creatorZheng, Yen_US
dc.date.accessioned2022-09-22T06:14:04Z-
dc.date.available2022-09-22T06:14:04Z-
dc.identifier.issn1545-5971en_US
dc.identifier.urihttp://hdl.handle.net/10397/95605-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsThe following publication S. Qi and Y. Zheng, "Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud," in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 2, pp. 765-779, 1 March-April 2021 is available at https://doi.org/10.1109/TDSC.2019.2908164en_US
dc.subjectAccess controlen_US
dc.subjectClouden_US
dc.subjectRevocationen_US
dc.titleCrypt-DAC : cryptographically enforced dynamic access control in the clouden_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage765en_US
dc.identifier.epage779en_US
dc.identifier.volume18en_US
dc.identifier.issue2en_US
dc.identifier.doi10.1109/TDSC.2019.2908164en_US
dcterms.abstractEnabling cryptographically enforced access controls for data hosted in untrusted cloud is attractive for many users and organizations. However, designing efficient cryptographically enforced dynamic access control system in the cloud is still challenging. In this paper, we propose Crypt-DAC, a system that provides practical cryptographic enforcement of dynamic access control. Crypt-DAC revokes access permissions by delegating the cloud to update encrypted data. In Crypt-DAC, a file is encrypted by a symmetric key list which records a file key and a sequence of revocation keys. In each revocation, a dedicated administrator uploads a new revocation key to the cloud and requests it to encrypt the file with a new layer of encryption and update the encrypted key list accordingly. Crypt-DAC proposes three key techniques to constrain the size of key list and encryption layers. As a result, Crypt-DAC enforces dynamic access control that provides efficiency, as it does not require expensive decryption/re-encryption and uploading/re-uploading of large data at the administrator side, and security, as it immediately revokes access permissions. We use formalization framework and system implementation to demonstrate the security and efficiency of our construction.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIEEE transactions on dependable and secure computing, Mar.-Apr. 2021, v. 18, no. 2, 8676350, p. 765-779en_US
dcterms.isPartOfIEEE transactions on dependable and secure computingen_US
dcterms.issued2021-03-
dc.identifier.scopus2-s2.0-85102718242-
dc.identifier.eissn1941-0018en_US
dc.identifier.artn8676350en_US
dc.description.validate202209_bcww-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberCOMP-0086-
dc.description.fundingSourceRGCen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS50205618-
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Zheng_Cpds_Enabling_Compressed.pdfPre-Published version3.22 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

69
Last Week
0
Last month
Citations as of Oct 13, 2024

Downloads

128
Citations as of Oct 13, 2024

SCOPUSTM   
Citations

18
Citations as of Oct 17, 2024

WEB OF SCIENCETM
Citations

13
Citations as of Oct 17, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.