University of Wollongong
Browse

k-times attribute-based anonymous access control for cloud computing

Download (524.38 kB)
journal contribution
posted on 2024-11-15, 06:38 authored by Joseph K Liu, Tsz Hon Yuen, Man Ho Allen Au, Xinyi Huang, Willy SusiloWilly Susilo, Jianying Zhou
In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period or an event. Further additional access will be denied. We also prove the security of our instantiation. Our implementation result shows that our scheme is practical.

History

Citation

Liu, J. K., Yuen, T., Au, M. Ho., Huang, X., Susilo, W. & Zhou, J. (2015). k-times attribute-based anonymous access control for cloud computing. IEEE Transactions on Computers, 64 (9), 2595-2608.

Journal title

IEEE Transactions on Computers

Volume

64

Issue

9

Pagination

2595-2608

Language

English

RIS ID

94387

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC