Font Size: a A A

Analysis Of Attribute-based Access Control Algorithms In Cloud Computing

Posted on:2016-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:D Y WangFull Text:PDF
GTID:2308330473965515Subject:Information security
Abstract/Summary:PDF Full Text Request
Cloud computing nowadays is a hot technology region in IT industry. For its lots of strengths, such as convenience, economy, scalability, companies don’t need to take the burden of management and maintenance of infrastructure. But alone with commercialization of cloud computing, security problem becomes a growing concern. Many cloud computing security accidents these years inspire more and more people’s sense of crisis. How to achieve practicable and efficient access control for users’ private data in dynamic and untrusted cloud computing environment is one of the urgent problems which affect the application of cloud computing.This thesis investigates access control methods in cloud computing and proposes two attribute-based access control schemes. Starting with introduction of cloud computing’s system structure, definition, features, security components and so on this thesis introduces traditional access control mechanism. Based on analyzes of contradictions between traditional access control mechanism and cloud computing, this thesis introduces access control mechanism in cloud computing. Furthermore the attribute-based access control schemes supporting constant size of ciphertext and secret key are proposed. This thesis proves the security of two schemes and analyzes their scalability and computational complexity. The analysis demonstrates the advantages of these two schemes compared with other related schemes and the experiment results indicate these schemes’ correctness and validity.
Keywords/Search Tags:Cloud Computing, Access Control, Constant-size Ciphertext, Hierarchical Authorities, Constant-size Secret Key
PDF Full Text Request
Related items