Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Proceedings of the 17th ACM conference on Computer and communications security
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
Protection of Identity Information in Cloud Computing without Trusted Third Party
SRDS '10 Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
SRDS '10 Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
Security and Privacy Challenges in Cloud Computing Environments
IEEE Security and Privacy
Secure interoperation of identity managements among different circles of trust
Computer Standards & Interfaces
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Privacy Preserving Access Control with Authentication for Securing Data in Clouds
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
SPICE: simple privacy-preserving identity-management for cloud environment
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Journal of Network and Computer Applications
Hi-index | 0.00 |
Identity privacy and access control pose a significant challenge for cloud services security. This is because a cloud service may have different owner and users, which necessitates privacy preserving access control. Although most existing identity management and access control schemes solve these problems to a certain extent, they also have some limitations. In this paper, we propose a new approach, called Privacy pReserving Access Management scheme (PRAM), which can satisfy all the desirable security requirements in cloud services. Specifically, there are two main contributions in this paper. First, we use two cryptographic primitives: Blind signature and Hash chain to protect identity privacy and secure authentication. Second, we combine on-demand access control with Service-Level Agreements (SLA) to provide flexible fine-grained access management. As a result, our PRAM scheme is applicable in cloud services due to its simplicity, low overhead, and efficiency.