Journal of Shanghai Jiao Tong University (Science) ›› 2018, Vol. 23 ›› Issue (5): 666-670.doi: 10.1007/s12204-018-1962-5
Previous Articles Next Articles
SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研)
Online:
2018-10-01
Published:
2018-10-07
Contact:
SU Mang (苏铓)
E-mail: sumang@njust.edu.cn
CLC Number:
SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研). Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud[J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(5): 666-670.
[1] | WANG Y D, YANG J H, XU C, et al. Survey on accesscontrol technologies for cloud computing [J]. Journalof Software, 2015, 26(5): 1129-1150 (in Chinese). |
[2] | JHA S, SURAL S, VAIDYA J, et al. Security analysisof temporal RBAC under an administrative model [J].Computers & Security, 2014, 46: 154-172. |
[3] | YANG L, TANG Z, LI R F, et al. Roles query algorithmin cloud computing environment based on userrequire [J]. Journal of Communications, 2010, 7(32):169-175 (in Chinese). |
[4] | LUO J,WANG H J, GONG X, et al. A novel role-basedaccess control model in cloud environments [J]. InternationalJournal of Computational Intelligence Systems,2016, 9(1): 1-9. |
[5] | LI J W, SQUICCIARINI A, LIN D, et al. SecLoc:Securing location-sensitive storage in the cloud[C]//Proceedings of the 20th ACM Symposium on AccessControl Models and Technologies. Vienna, Austria:ACM, 2015: 51-61. |
[6] | ZHOU L, VARADHARAJAN V, HITCHENS M.Trust enhanced cryptographic role-based access controlfor secure cloud data storage [J]. IEEE Transactionson Information Forensics and Security, 2015,10(11): 2381-2395. |
[7] | ZHOU L, VARADHARAJAN V, GOPINATH K. Asecure role-based cloud storage system for encryptedpatient-centric health records [J]. The Computer Journal,2016, 59(11): 1593-1611. |
[8] | XU P, JIAO T F, WU Q H, et al. Conditional identitybasedbroadcast proxy re-encryption and its applicationto cloud email [J]. IEEE Transactions on Computers,2016, 65(1): 66-79. |
[9] | ZHANG Y H, LI J, CHEN X F, et al. Anonymousattribute based proxy re-encryption for access controlin cloud computing [J]. Security and CommunicationNetworks, 2016, 9(14): 2397-2411. |
[10] | LI J G, ZHAO X X, ZHANG Y C, et al. Provably securecertificate-based conditional proxy re-encryption[J]. Journal of Information Science and Engineering,2016, 32(4): 813-830. |
[11] | LIU Q, WANG G J, WU J. Time-based proxy reencryptionscheme for secure data sharing in a cloudenvironment [J]. Information Sciences, 2014, 258(3):355-370. |
[12] | YANG Y J, LU H B,WENG J, et al. Fine-grained conditionalproxy re-encryption and application [J]. LectureNotes in Computer Science, 2014, 8782: 206-222. |
[13] | TANG Q. Type-based proxy re-encryption and its construction[J]. Lecture Notes in Computer Science, 2008,5365: 130-144. |
[14] | SU M, SHI G Z, XIE R N, et al. Multi-element basedon proxy re-encryption scheme for mobile cloud computing[J]. Journal of Communications, 2015, 36(11):73-79 (in Chinese). |
[15] | SU M, LI F H, SHI G Z, et al. A user-centric datasecure creation scheme in cloud computing [J]. ChineseJournal of Electronics, 2016, 25(4): 753-760. |
[1] | LI Jianhua. A Survey of New E-Government and Its Security Technologies [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381. |
[2] | Jiantao SHI, Xiukun LI, Zhaoxin ZHANG. CloudStack Based Virtual Simulation Cloud Platform for Network Attack and Defense Experiment [J]. Research and Exploration in Laboratory, 2017, 36(5): 75-78. |
[3] | Xu WU, Renan CHEN, Dezhi WEI. Design and Application of Speech Lab under Cloud Computing [J]. Research and Exploration in Laboratory, 2017, 36(5): 239-242. |
[4] | LI Da-zhi1,2* (李大志), LIU Jian-hua3 (刘建华), DONG Xin1 (董鑫),LI Lu-qun2 (李鲁群), CHEN Jun-hua2 (陈军华). Application-Oriented Cloud Monitoring Data Distribution Mechanism [J]. Journal of shanghai Jiaotong University (Science), 2015, 20(2): 149-155. |
[5] | WANG Liang-liang1* (王亮亮), CHEN Ke-fei2 (陈克非),MAO Xian-ping1 (毛贤平), WANG Yong-tao3 (王永涛). Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 398-405. |
[6] | WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源). Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 440-442. |
[7] | CHI Ziwena,b,ZHANG Fenga,b,DU Zhenhonga,b,LIU Renyia,b. Parallel Resampling Method of Remote Sensing Data Based on Pre-Partitioning for Cloud Computing [J]. Journal of Shanghai Jiaotong University, 2014, 48(11): 1627-1632. |
[8] | GU Yunqing1,MU Jiegang1,ZHENG Shuihua1,ZHAO Gang2, SUN Zhuangzhi2,RU Jing2. Characteristics of Drag Reduction and Control Behavior of Boundary Layer on Multi-Factor Coupling of Jet Surface [J]. Journal of Shanghai Jiaotong University, 2014, 48(09): 1334-1340. |
[9] | LIU Chen-Yan-1, 2 , PAN Li-1, 2 , ZI Xiao-Chao-2. A Binary-String-Set-Based Algebraic Framework for Policy Composition [J]. Journal of Shanghai Jiaotong University, 2013, 47(04): 579-583. |
[10] | ZHOU Gui-Yin, HE Chen, JIANG Ling-Ge. Single Transceiver and Network Characteristics Based MAC Protocol for Cognitive Radio Wireless Sensor Networks [J]. Journal of Shanghai Jiaotong University, 2012, 46(11): 1729-1735. |
[11] | XIAO Rong, JIANG Ling-Ge, HE Chen. A Channel Reliability Based Multi-channel MAC Protocol in Wireless Sensor Networks [J]. Journal of Shanghai Jiaotong University, 2012, 46(09): 1382-1386. |
[12] | LIU Su-Na-1, 2 , PAN Li-1, 2 , 3 , YAO Li-Hong-2. BLP Based Access Control Mechanism in Multi-level Network Systems [J]. Journal of Shanghai Jiaotong University, 2012, 46(09): 1387-1391. |
[13] | CHEN De-Fu, TAO Zheng-Su, ZHU Jian-Ping. An Adaptive and Asynchronous MAC Protocol for Wireless Sensor Networks [J]. Journal of Shanghai Jiaotong University, 2011, 45(10): 1521-1525. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 125
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 464
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||