k-Times Attribute-Based Anonymous Access Control for Cloud Computing

Tsz Hon Yuen, Joseph K. Liu, Man Ho Allen Au, Xinyi Huang, Willy Susilo, Jianying Zhou

Research output: Journal article publicationJournal articleAcademic researchpeer-review

45 Citations (Scopus)

Abstract

In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period or an event. Further additional access will be denied. We also prove the security of our instantiation. Our implementation result shows that our scheme is practical.
Original languageEnglish
Article number6945366
Pages (from-to)2595-2608
Number of pages14
JournalIEEE Transactions on Computers
Volume64
Issue number9
DOIs
Publication statusPublished - 1 Sept 2015

Keywords

  • anonymous access
  • attribute-based
  • cloud computing
  • k-times

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Software
  • Hardware and Architecture
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'k-Times Attribute-Based Anonymous Access Control for Cloud Computing'. Together they form a unique fingerprint.

Cite this