:::

詳目顯示

回上一頁
題名:A Lightweight Fine-grained Sensitive Data Access Control Model in a Cloud Computing Environment
書刊名:國防管理學報
作者:林忠毅傅振華 引用關係葉彥利
作者(外文):Lin, Chung-yiFu, Chen-huaYeh, Yen-li
出版日期:2016
卷期:37:1
頁次:頁1-14
主題關鍵詞:雲端運算資料存取控制資料安全Cloud computingData access controlData security
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:3
「雲端運算」為新興的運算服務模式,然而,由於它的特殊性,衍生「安全」的議題,特別是機敏資料,再者「雲端運算」也必須考慮低運算能力設備的存取需求。因此,本研究整合「情境」和「屬性」的概念,規劃細粒度資料存取控制模式,在這模式中,以輕巧的密碼運算或少低運算能力設備的運算消耗及籍由誠信的資料控制伺服器代替資料擁有者進行授予及撤銷使用者存取權。
Although cloud computing is an emerging computing service model, its unique features raise the issue of security, particularly with regard to the confidentiality of data. Moreover, the devices used with this approach often have relatively low computing power. This study integrates the concepts of both context and attributes to propose a fine-grained data access control model. To reduce the computational overhead, and thus raise efficiency while enabling devices with low computing power to operate properly, the proposed model employs lightweight cryptographic operations on the user side, and uses a trusted data control server to be responsible for granting and revocation of user privileges, instead of the data owner.
期刊論文
1.Zissis, D.、Lekkas, D.(2012)。Addressing cloud computing security issues。Future Generation Computer Systems,28(3),583-592。  new window
2.Rimal, Bhaskar Prasad、Jukan, A.、Katsaros, D.、Goeleven, Y.(2011)。Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach。Journal of Grid Computing,9(1),3-26。  new window
3.Weiss, A.(200712)。Computing in the Clouds。netWorker,11(4),16-25。  new window
4.Subashini, S.、Kavitha, V.(2011)。A survey on security issues in service delivery models of cloud computing。Journal of Network and Computer Applications,34(1),1-11。  new window
5.Marston, Sean、Li, Zhi、Bandyopadhyay, Subhajyoti、Zhang, Juheng、Ghalsasi, Anand(2011)。Cloud computing: The business perspective。Decision Support Systems,51(1),176-189。  new window
6.Xu, Xun(2012)。From cloud computing to cloud manufacturing。Robotics and Computer-Integrated Manufacturing,28(1),75-86。  new window
7.Sultan, Nabil(2010)。Cloud computing for education: A new dawn?。International Journal of Information Management,30(2),109-116。  new window
8.Wang, R. C.、Juang, W. S.、Lei, C. L.(2008)。A Web Metering Scheme for Fair Advertisement Transactions。International Journal of Security and its Applications,2(4),49-56。  new window
9.Buyya, Rajkumar、Yeo, Chee Shin、Venugopal, Srikumar、Broberg, James、Brandic, Ivona(2009)。Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility。Future Generation Computer Systems,25(6),599-616。  new window
10.Liao, Y. P.、Wang, S. S.(2009)。A secure dynamic ID based remote user authentication scheme for multi-server environment。Computer Standards & Interfaces,31(1),24-29。  new window
11.Chen, T. Z.、Lee, W. B.、Chen, H. B.(2008)。A round- and computation-efficient three-party authenticated key exchange protocol。The Journal of Systems and Software,81(9),1581-1590。  new window
12.Chung, Y. F.、Huang, K. H.、Lai, F.、Chen, T. S.(2007)。ID-based digital signature scheme on the elliptic curve cryptosystem。Computer Stands & Interfaces,29(6),601-604。  new window
13.Conti, M.(2012)。Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence。Journal of Pervasive and Mobile Computing,8(1),2-21。  new window
14.Henricksen, K.、Indulska, J.(2006)。Developing context-aware pervasive computing applications: Models and approach。Journal of Pervasive and Mobile Computing,2(1),37-64。  new window
15.Hong, J. Y.、Suh, E. H.、Kim, S. J.(2009)。Context-aware systems: A literature review and classification。Expert Systems with Applications,36(4),8509-8522。  new window
16.Al-Muhtadi, J.、Hill, R.、Al-Rwais, S.(2011)。Access control using threshold cryptography for ubiquitous computing environments。Journal of King Saud University-Computer and Information Science,23,71-78。  new window
17.Munoz, M. A.、Rodriguez, M.、Favela, J.、Gonzalez, V.、Martinez-Garcia, A.、González, V. M.(2003)。Context-aware Mobile Communication in Hospitals。IEEE Computer Society,36(8),60-67。  new window
18.Shi, Q.、Zhang, N.、Jones, D. L.(2012)。Efficient autonomous signature exchange on ubiquitous networks。Journal of Network and Computer Applications,35(6),1793-1806。  new window
19.Sun, D.、Chang, G.、Sun, L.、Wang, X.(2011)。Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments。Procedia Engineering,15,2852-2856。  new window
會議論文
1.Schnorr, C. P.(1990)。Efficient identification and signatures for smart Cards。Lecture Notes in Computer Science。Springer-Verlag。239-252。  new window
2.Goyal, V.、Pandey, O.、Sahai, A.(2006)。Attribute-based encryption for fine-grained access control of encrypted data。The 13th ACM conference on Computer and communications security。ACM。89-98。  new window
3.Li, J.、Zhao, G.、Chen, X.、Xie, D.、Rong, C.、Li, W.、Tang, L.、Tang, Y.(2010)。Fine-grained data access control systems with user accountability in cloud computing89-96。  new window
4.Jih, W. R.、Cheng, S. Y.、Hsu, Y. J.、Tasi, T. M.(2005)。Context-aware Access Control in Pervasive Healthcare21-28。  new window
5.Yu, S.、Wang, C.、Ren, K.、Lou, W.(2010)。Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing534-542。  new window
6.Zhou, M.、Mu, Y.、Susilo, W.、Au, M. H.、Yan, J.(2011)。Privacy-Preserved Access Control for Cloud Computing83-90。  new window
研究報告
1.Mell, P.、Grance, T.(2009)。The NIST Definition of Cloud Computing。National Institute of Standards and Technology, Information Technology Laboratory。  new window
圖書
1.Cloud Security Alliance(2011)。SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING。  new window
2.Hogan, M.、Liu, F.、Sokol, A.、Tong, J.(2011)。NIST Cloud Computing Standards Roadmap。Special Publisher。  new window
其他
1.Cloud Security Alliance(2010)。Top threats to cloud computing,https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf。  new window
2.Hickey, A. R.(2010)。IDC: Challenges Still Loom Over Cloud Services,http://www.crn.com/news/applications-os/222200360/idc-challenges-still-loom-over-cloud-services.htm。  new window
3.Louw, I.。The Challenges & Benefits of Cloud Services-Survey Findings 2009,http://www.ebizq.net/blogs/bpm_insights/2010/01/following-their-prediction-that-cloud.php。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE