期刊文献+

Towards Efficient and Secure Access Control System for Mobile Cloud Computing 被引量:5

Towards Efficient and Secure Access Control System for Mobile Cloud Computing
下载PDF
导出
摘要 This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud. This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.
出处 《China Communications》 SCIE CSCD 2015年第12期43-52,共10页 中国通信(英文版)
基金 supported by National Natural Science Foundation of China(No.U 1405254, 61472092) China Postdoctoral Science Foundation(No.2015M581101) National Science and Technology SupportingFoundation of China(No.2014BAH41B00)
关键词 cloud execution constraints partition encryption Encryption satisfying assume posed visualization 移动设备 网络安全 访问控制系统 计算 服务提供商 网络接入点 控制方案 基础设施
  • 相关文献

参考文献22

  • 1WANG Cong, REN Kui, WANG Jia.Secure Optimiza- tion Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming [J], IEEE Trans. Computers,[EB/OL]http://ieeexplore.ieee.org/stamp/ stamp.jsp?tp=&arnumber=70707512015, 2015-3- 27/2015-7-20. 被引量:1
  • 2YANG Kan, JIA Xiaohua, Expressive, Efficient, and Revocable DataAccess Control for Multi-Authority- Cloud Storage[J], IEEE Trans. Parallel and Distributed Systems, 2014, 25(7): 1735-1744. 被引量:1
  • 3WANGShangguang, ZHENGZibin, WUZhengping, et al.Reputation Measurement and Malicious Feed- back Rating Prevention in Web Service Recommen- dation Systems[J], /EEE Trans. ServicesComputing, 2015,8(5): 755-767. 被引量:1
  • 4ZHOU Xuejun, GAO Wei, CAO Guohong, et aL An Incentive Framework for Cellular Traffic Off- loading[J], IEEE Trans. Mobile Computing, 2014, 13(3): 541-555. 被引量:1
  • 5ABOLFAZLI S., SANAEI Z., AHMED E., et al. Cloud-Based Augmentation for Mobile Devic- es: Motivation, Taxonomies, and Open Chal- lenges[J], IEEE Communications Surveys & Tuto- rials, 2014, 16(1): 337-368. 被引量:1
  • 6ZOHAR E., CIDON I.,MOKRYNO., PACK: Predic- tion-Based Cloud Bandwidth and Cost Reduc- tion System[J], IEEE/ACM Trans. Networking, 2014, 22(1): 39-51. 被引量:1
  • 7YUAN Jiawei,YU Shucheng, Privacy Preserving Back-Propagation Neural Network Learning Made Practical with CLoud Computing[J], IEEE Trans. Parallel and Distributed Systems, 2014, 25(1): 212-221. 被引量:1
  • 8OLTEANU A., TAPUS N.,IOSUP A., Extending the Capabilities of Mobile Devices for Online So- cial Applications Through Cloud Offloading[C], Proceedings of the12th IEEE/ACM International Symposium on Cluster Cloud and Grid Comput- ing (CCGrid),May, Delft, Netherlands, 2013:160- 163. 被引量:1
  • 9FELEMBAN M., BASALAMAH S.,GHAFOOR A., A Distributed Cloud Architecture for Mobile Mul- timedia Services[J], IEEE Network, 2013, 27(5): 20-27. 被引量:1
  • 10VERBELEN T, SIMOENS R, DE TURCK F., et al.Le- veraging Cloudlets for Immersive Collaborative Applications[J], IEEE Pervasive Computing, 2013, 12(4): 30-38. 被引量:1

二级参考文献6

  • 1Shan-Shan Tu,Shao-Zhang Niu,Meng-Jiao Li.An Efficient Access Control Scheme for Cloud Environment[J]. Cybernetics and Information Technologies . 2013 (3) 被引量:1
  • 2Cong Wang,Qian Wang,Kui Ren,Ning Cao,Wenjing Lou.Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Transactions on Services Computing . 2012 被引量:1
  • 3Yang Kan,Jia Xiao-hua,et al.Attribute-based Fine-Grained Access Control with Efficient Revocation in Cloud Storage Systems. Proc of ASIA CCS . 2013 被引量:1
  • 4BETHENCOURT J,,SAHAI A,WATERS B.Ciphertext-policy attrib-ute-based encryption. Proc of IEEE Symposium on Security andPrivacy . 2007 被引量:1
  • 5YU S,WANG C,REN K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[C]//. INFOCOM,2010 Proceeding IEEE . 2010 被引量:1
  • 6K.Yang,X.Jia,K.Ren,B.Zhang,R.Xie."Effective data access control for multi-authority cloud storage". IEEE Trans.Systems Information Forensics and Security . 2013 被引量:1

共引文献7

同被引文献14

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部