期刊文献+

Towards Efficient and Secure Access Control System for Mobile Cloud Computing 被引量:6

Towards Efficient and Secure Access Control System for Mobile Cloud Computing
在线阅读 下载PDF
导出
摘要 This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud. This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.
出处 《China Communications》 SCIE CSCD 2015年第12期43-52,共10页 中国通信(英文版)
基金 supported by National Natural Science Foundation of China(No.U 1405254, 61472092) China Postdoctoral Science Foundation(No.2015M581101) National Science and Technology SupportingFoundation of China(No.2014BAH41B00)
关键词 cloud execution constraints partition encryption Encryption satisfying assume posed visualization 移动设备 网络安全 访问控制系统 计算 服务提供商 网络接入点 控制方案 基础设施
作者简介 TU Shanshan, is a postdoctoral researcher in the Department of Electronic Engineering at Tsinghua University. He received the BE degree from Chengdu University of Information Technology, China, in 2005, his ME degree from Guilin University of Electronic Science and Technology, in 2011, and his PhD degree from Computer Science Department at Beijing University of Post and Telecommunication in 2014, all in electrical and computer engineering. He visited University of Essex as joint doctoral training from 2013 to 2014. His research interests are in the areas of cloud computing security and information hiding analysis technology. The corresponding author. Email: sstu@mail.tsing hua.edu.cnHUANG Yongfeng, is a professor in the Department of Electronic Engineering at Tsinghua University, Beijing. His research interests include Cloud Com- putin, P2P, multimedia network and next generation Internet. He has published five books and over 50 research papers on computer network and multimedia communication. Email: yfhuang@tsinghua.edu.cn.
  • 相关文献

参考文献22

  • 1WANG Cong, REN Kui, WANG Jia.Secure Optimiza- tion Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming [J], IEEE Trans. Computers,[EB/OL]http://ieeexplore.ieee.org/stamp/ stamp.jsp?tp=&arnumber=70707512015, 2015-3- 27/2015-7-20.
  • 2YANG Kan, JIA Xiaohua, Expressive, Efficient, and Revocable DataAccess Control for Multi-Authority- Cloud Storage[J], IEEE Trans. Parallel and Distributed Systems, 2014, 25(7): 1735-1744.
  • 3WANGShangguang, ZHENGZibin, WUZhengping, et al.Reputation Measurement and Malicious Feed- back Rating Prevention in Web Service Recommen- dation Systems[J], /EEE Trans. ServicesComputing, 2015,8(5): 755-767.
  • 4ZHOU Xuejun, GAO Wei, CAO Guohong, et aL An Incentive Framework for Cellular Traffic Off- loading[J], IEEE Trans. Mobile Computing, 2014, 13(3): 541-555.
  • 5ABOLFAZLI S., SANAEI Z., AHMED E., et al. Cloud-Based Augmentation for Mobile Devic- es: Motivation, Taxonomies, and Open Chal- lenges[J], IEEE Communications Surveys & Tuto- rials, 2014, 16(1): 337-368.
  • 6ZOHAR E., CIDON I.,MOKRYNO., PACK: Predic- tion-Based Cloud Bandwidth and Cost Reduc- tion System[J], IEEE/ACM Trans. Networking, 2014, 22(1): 39-51.
  • 7YUAN Jiawei,YU Shucheng, Privacy Preserving Back-Propagation Neural Network Learning Made Practical with CLoud Computing[J], IEEE Trans. Parallel and Distributed Systems, 2014, 25(1): 212-221.
  • 8OLTEANU A., TAPUS N.,IOSUP A., Extending the Capabilities of Mobile Devices for Online So- cial Applications Through Cloud Offloading[C], Proceedings of the12th IEEE/ACM International Symposium on Cluster Cloud and Grid Comput- ing (CCGrid),May, Delft, Netherlands, 2013:160- 163.
  • 9FELEMBAN M., BASALAMAH S.,GHAFOOR A., A Distributed Cloud Architecture for Mobile Mul- timedia Services[J], IEEE Network, 2013, 27(5): 20-27.
  • 10VERBELEN T, SIMOENS R, DE TURCK F., et al.Le- veraging Cloudlets for Immersive Collaborative Applications[J], IEEE Pervasive Computing, 2013, 12(4): 30-38.

二级参考文献6

  • 1Shan-Shan Tu,Shao-Zhang Niu,Meng-Jiao Li.An Efficient Access Control Scheme for Cloud Environment[J]. Cybernetics and Information Technologies . 2013 (3)
  • 2Cong Wang,Qian Wang,Kui Ren,Ning Cao,Wenjing Lou.Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Transactions on Services Computing . 2012
  • 3Yang Kan,Jia Xiao-hua,et al.Attribute-based Fine-Grained Access Control with Efficient Revocation in Cloud Storage Systems. Proc of ASIA CCS . 2013
  • 4BETHENCOURT J,,SAHAI A,WATERS B.Ciphertext-policy attrib-ute-based encryption. Proc of IEEE Symposium on Security andPrivacy . 2007
  • 5YU S,WANG C,REN K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[C]//. INFOCOM,2010 Proceeding IEEE . 2010
  • 6K.Yang,X.Jia,K.Ren,B.Zhang,R.Xie."Effective data access control for multi-authority cloud storage". IEEE Trans.Systems Information Forensics and Security . 2013

共引文献7

同被引文献16

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部