• DocumentCode
    3705293
  • Title

    Traceable hierarchical attribute-based authentication for the cloud

  • Author

    Huihui Yang;Vladimir A. Oleshchuk

  • Author_Institution
    Department of Information and Communication Technology, University of Agder, Grimstad, Norway
  • fYear
    2015
  • Firstpage
    685
  • Lastpage
    689
  • Abstract
    When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. In this paper, we use “user-based” and “attributebased” hierarchy to describe these two situations respectively. Moreover, both HABA schemes are traceable.
  • Keywords
    "Cloud computing","Polynomials","Generators","Conferences","Authentication","Encryption"
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2015 IEEE Conference on
  • Type

    conf

  • DOI
    10.1109/CNS.2015.7346888
  • Filename
    7346888