International Journal of Soft Computing

Year: 2016
Volume: 11
Issue: 6
Page No. 362 - 373

CB-HPAC Cluster Based-Hierarchical Privacy Preserving Access Control Technique in Cloud

Authors : Sudha Senthilkumar and Madhu Viswanatham

References

Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceedings of the IEEE Symposium on Security and Privacy, May 20-23, 2007, Berkeley, CA., USA., pp: 321-334.

Cadenhead, T., M. Kantarcioglu and B. Thuraisingham, 2010. Scalable and efficient reasoning for enforcing role-based access control. Proceedings of the IFIP 24th Annual Conference on Data and Applications Security and Privacy, June 21-23, 2010, IFIP, Rome, Itlay, ISBN:978-3-642-13738-9, pp: 209-224.

Elliott, A. and S. Knight, 2010. Role Explosion: Acknowledging the Problem. In: Software Engineering Research and Practice, Elliott, A.A. and G.S. Knight (Eds.). Royal Military College, Kingston, Ontario, Canada, pp: 349-355.

Fan, B., D.G. Andersen, M. Kaminsky and M.D. Mitzenmacher, 2014. Cuckoo filter: Practically better than bloom. Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, December 2-5, 2014, ACM, New York, USA., ISBN:978-1-4503-3279-8, pp: 75-88.

Freudenthal, E., T. Pesin, L. Port, E. Keenan and V. Karamcheti, 2002. DRBAC: Distributed role-based access control for dynamic coalition environments. Proceedings of the 22nd International Conference on Distributed Computing Systems, July 2-5, 2002, IEEE, New York, USA., ISBN:0-7695-1585-1, pp: 411-420.

Goyal, V., O. Pandey, A. Sahai and B. Waters, 2006. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30-November 3, 2006, ACM Press, Alexandria, VA, USA., pp: 89-98.

Grobauer, B., T. Walloschek and E. Stocker, 2011. Understanding cloud computing vulnerabilities. IEEE Secur. Privacy, 9: 50-57.
CrossRef  |  Direct Link  |  

Grossman, R.L., 2009. The case for cloud computing. IT. Prof., 11: 23-27.
CrossRef  |  Direct Link  |  

Li, F., Y. Rahulamathavan, M. Conti and M. Rajarajan, 2015. Robust access control framework for mobile cloud computing network. Comput. Commun., 68: 61-72.
Direct Link  |  

Li, Q., M. Xu and X. Zhang, 2008. Towards a group-based RBAC model and decentralized user-role administration. Proceedings of the 2008 28th International Conference on Distributed Computing Systems Workshops, June 17-20, 2008, IEEE, Beijing, pp: 441-446.

Lin, H., L. Xu, X. Huang, W. Wu and Y. Huang, 2015. A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Networks, 35: 51-64.
Direct Link  |  

Lingwei, S., Y. Fang, Z. Ru and N. Xinxin, 2015. Method of secure, scalable and fine-grained data access control with efficient revocation in untrusted cloud. J. China Universities Posts Telecommun., 22: 38-43.
Direct Link  |  

Marston, S., Z. Li, S. Bandyopadhyay, J. Zhang and A. Ghalsasi, 2011. Cloud computing: The business perspective. Decis. Support Syst., 51: 176-189.
Direct Link  |  

Mohan, L. and M.S. Elayidom, 2015. Fine grained access control and revocation for secure cloud environment: A polynomial based approach. Procedia Comput. Sci., 46: 719-724.
Direct Link  |  

Nabeel, M. and E. Bertino, 2014. Privacy preserving delegated access control in public clouds. IEEE. Trans. Knowl. Data Eng., 26: 2268-2280.
CrossRef  |  Direct Link  |  

Nabeel, M., N. Shang and E. Bertino, 2013. Privacy preserving policy-based content sharing in public clouds. IEEE. Trans. Knowl. Data Eng., 25: 2602-2614.
CrossRef  |  Direct Link  |  

Pearson, S., 2009. Taking account of privacy when designing cloud computing services. Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, May 22-23, 2009, Vancouver, Canada, pp: 44-52.

Ruj, S., M. Stojmenovic and A. Nayak, 2014. Decentralized access control with anonymous authentication of data stored in clouds. Parallel Distrib. Syst. IEEE. Trans., 25: 384-394.
CrossRef  |  Direct Link  |  

Senthilkumar, S. and M. Viswanatham, 2014. ACAFD: Secure and scalable access control with assured file deletion for outsourced data in cloud. J. ICT Res. Applic., 8: 18-30.
Direct Link  |  

Shang, N., M. Nabeel, F. Paci and E. Bertino, 2010. A privacy-preserving approach to policy-based content dissemination. Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, March 1-6, 2010, IEEE, Long Beach, California, ISBN: 978-1-4244-5444-0, pp: 944-955.

Su, J.S., D. Cao, X.F. Wang, Y.P. Sun and Q.L. Hu, 2011. Attribute based encryption schemes. J. Software, 22: 1299-1315.
Direct Link  |  

Takabi, H., J.B. Joshi and G.J. Ahn, 2010. Security and privacy challenges in cloud computing environments. IEEE Secur. Privacy, 8: 24-31.
CrossRef  |  Direct Link  |  

Wan, Z., J. Liu and R.H. Deng, 2012. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inform. Forensics Secur., 7: 743-754.
CrossRef  |  

Wang, G., Q. Liu, J. Wu and M. Guo, 2011. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur., 30: 320-331.
CrossRef  |  Direct Link  |  

Yu, S., C. Wang, K. Ren and W. Lou, 2010. Achieving secure, scalable and fine-grained data access control in cloud computing. Proceeding of the 29th Conference on Information Communications, March 15-19, 2010, San Diego, CA., USA., pp: 1-9.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved