Loading...
Search for:
user-access-control
0.009 seconds
Access control enforcement on outsourced data ensuring privacy of access control policies
, Article Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, 4 July 2011 through 8 July 2011, Istanbul ; 2011 , Pages 491-497 ; 9781612843810 (ISBN) ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
2011
Abstract
Nowadays, data outsourcing has become a solution for many organizations especially large scale enterprises due to the high costs of in-house management of the rapidly growing data. Among all security requirements in this context, user access control and its following dynamic changes are of interest. In this paper, we propose an efficient and reliable mechanism to solve this problem in owner-write-users-read applications. A novel solution is introduced to enforce access control on outsourced data using the Chinese Remainder Theorem. The solution allows updating policy changes at a limited cost in terms of both computational power and the number of users' secret keys. Although the server, on...