Skip to main content
placeholder image

k-times attribute-based anonymous access control for cloud computing

Journal Article


Download full-text (Open Access)

Abstract


  • In this paper, we propose a new notion called k-times

    attribute-based anonymous access control, which is particularly

    designed for supporting cloud computing environment. In this

    new notion, a user can authenticate himself/herself to the cloud

    computing server anonymously. The server only knows the user

    acquires some required attributes, yet it does not know the

    identity of this user. In addition, we provide a k-times limit

    for anonymous access control. That is, the server may limit a

    particular set of users (i.e., those users with the same set of

    attribute) to access the system for a maximum k-times within a

    period or an event. Further additional access will be denied. We

    also prove the security of our instantiation. Our implementation

    result shows that our scheme is practical.

UOW Authors


  •   Liu, Joseph K. (external author)
  •   Yuen, Tsz Hon (external author)
  •   Au, Man Ho Allen (external author)
  •   Huang, Xinyi (external author)
  •   Susilo, Willy
  •   Zhou, Jianying (external author)

Publication Date


  • 2015

Citation


  • Liu, J. K., Yuen, T., Au, M. Ho., Huang, X., Susilo, W. & Zhou, J. (2015). k-times attribute-based anonymous access control for cloud computing. IEEE Transactions on Computers, 64 (9), 2595-2608.

Scopus Eid


  • 2-s2.0-84939245573

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=5119&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/4098

Has Global Citation Frequency


Number Of Pages


  • 13

Start Page


  • 2595

End Page


  • 2608

Volume


  • 64

Issue


  • 9

Place Of Publication


  • United States

Abstract


  • In this paper, we propose a new notion called k-times

    attribute-based anonymous access control, which is particularly

    designed for supporting cloud computing environment. In this

    new notion, a user can authenticate himself/herself to the cloud

    computing server anonymously. The server only knows the user

    acquires some required attributes, yet it does not know the

    identity of this user. In addition, we provide a k-times limit

    for anonymous access control. That is, the server may limit a

    particular set of users (i.e., those users with the same set of

    attribute) to access the system for a maximum k-times within a

    period or an event. Further additional access will be denied. We

    also prove the security of our instantiation. Our implementation

    result shows that our scheme is practical.

UOW Authors


  •   Liu, Joseph K. (external author)
  •   Yuen, Tsz Hon (external author)
  •   Au, Man Ho Allen (external author)
  •   Huang, Xinyi (external author)
  •   Susilo, Willy
  •   Zhou, Jianying (external author)

Publication Date


  • 2015

Citation


  • Liu, J. K., Yuen, T., Au, M. Ho., Huang, X., Susilo, W. & Zhou, J. (2015). k-times attribute-based anonymous access control for cloud computing. IEEE Transactions on Computers, 64 (9), 2595-2608.

Scopus Eid


  • 2-s2.0-84939245573

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=5119&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/4098

Has Global Citation Frequency


Number Of Pages


  • 13

Start Page


  • 2595

End Page


  • 2608

Volume


  • 64

Issue


  • 9

Place Of Publication


  • United States