Loading...
Search for: user-access-control
0.009 seconds

    Access control enforcement on outsourced data ensuring privacy of access control policies

    , Article Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, 4 July 2011 through 8 July 2011, Istanbul ; 2011 , Pages 491-497 ; 9781612843810 (ISBN) Tourani, P ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
    2011
    Abstract
    Nowadays, data outsourcing has become a solution for many organizations especially large scale enterprises due to the high costs of in-house management of the rapidly growing data. Among all security requirements in this context, user access control and its following dynamic changes are of interest. In this paper, we propose an efficient and reliable mechanism to solve this problem in owner-write-users-read applications. A novel solution is introduced to enforce access control on outsourced data using the Chinese Remainder Theorem. The solution allows updating policy changes at a limited cost in terms of both computational power and the number of users' secret keys. Although the server, on...