DocumentCode
3705293
Title
Traceable hierarchical attribute-based authentication for the cloud
Author
Huihui Yang;Vladimir A. Oleshchuk
Author_Institution
Department of Information and Communication Technology, University of Agder, Grimstad, Norway
fYear
2015
Firstpage
685
Lastpage
689
Abstract
When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. In this paper, we use “user-based” and “attributebased” hierarchy to describe these two situations respectively. Moreover, both HABA schemes are traceable.
Keywords
"Cloud computing","Polynomials","Generators","Conferences","Authentication","Encryption"
Publisher
ieee
Conference_Titel
Communications and Network Security (CNS), 2015 IEEE Conference on
Type
conf
DOI
10.1109/CNS.2015.7346888
Filename
7346888
Link To Document