CDController: A Cloud Data Access Control System Based on Reputation

Huaqing Lin, Zheng Yan, Raimo Kantola

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    The rapid development of cloud computing is changing the way of service provision, data usage and sharing over the Internet. Cloud data privacy and security protection is a crucial issue that impacts the success of cloud computing and big data. A number of cloud data access control schemes have been proposed in the literature. However, existing solutions suffer from high computation complexity and cost and therefore few of them have been really deployed in practice. In this paper, we introduce a cloud data access control system based on reputation named CDController. The system can securely control cloud data access and effectively reduce access risk according to the reputations of cloud computing entities by applying proxy re-encryption in the situation that the data owner is not available online or does not know how to control the access. System evaluation based on a prototype implementation shows the effectiveness of the CDController.

    Original languageEnglish
    Title of host publicationIEEE CIT 2017 - 17th IEEE International Conference on Computer and Information Technology
    PublisherIEEE
    Pages223-230
    Number of pages8
    ISBN (Electronic)9781538609583
    DOIs
    Publication statusPublished - 11 Sept 2017
    MoE publication typeA4 Conference publication
    EventIEEE International Conference on Computer and Information Technology - Helsinki, Finland
    Duration: 21 Aug 201723 Aug 2017
    Conference number: 17

    Publication series

    NameInternational Conference on Communications and Information Technology
    ISSN (Print)2329-6364
    ISSN (Electronic)2329-6372

    Conference

    ConferenceIEEE International Conference on Computer and Information Technology
    Abbreviated titleCIT
    Country/TerritoryFinland
    CityHelsinki
    Period21/08/201723/08/2017

    Keywords

    • Access control system
    • Cloud computing
    • Data security
    • Proxy re-encryption
    • Reputation

    Fingerprint

    Dive into the research topics of 'CDController: A Cloud Data Access Control System Based on Reputation'. Together they form a unique fingerprint.

    Cite this