DocumentCode
3141805
Title
Flexible Authorization by Generating Public Re-decryption Trapdoor in Outsourced Scenarios
Author
Zhang, Yang ; Chen, Jun-liang
Author_Institution
State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear
2011
fDate
4-9 July 2011
Firstpage
760
Lastpage
761
Abstract
With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect sensitive information in this outsourcing scenario. However, the rigid combination in existing approaches has difficulty in satisfying the flexibility requirement of access control for diverse applications. In this paper, we propose a flexible authorization by generating public re-decryption trapdoor. The features of our solution are as follows: simple key management without the need of key derivation for users to decrypt cipher texts, grouping users during authorization to reduce management workload, composing conditions for accessing new resources without generating new keys if the re-encryption keys for atomic conditions have been produced.
Keywords
authorisation; cryptography; outsourcing; access control; cryptography; data outsourcing; flexible authorization; key management; management workload reduction; public redecryption trapdoor generation; service outsourcing; service-oriented technologies; Authorization; Encryption; Outsourcing; Public key; Access Control; Outsourced Data Service; Proxy Re-encryption Scheme;
fLanguage
English
Publisher
ieee
Conference_Titel
Cloud Computing (CLOUD), 2011 IEEE International Conference on
Conference_Location
Washington, DC
ISSN
2159-6182
Print_ISBN
978-1-4577-0836-7
Electronic_ISBN
2159-6182
Type
conf
DOI
10.1109/CLOUD.2011.87
Filename
6008790
Link To Document