Journal on Communications ›› 2018, Vol. 39 ›› Issue (2): 96-104.doi: 10.11959/j.issn.1000-436x.2018028

• Papers • Previous Articles     Next Articles

Proxy re-encryption based multi-factor access control scheme in cloud

Mang SU1,Guozhen SHI2,Anmin FU1,Yan YU1,Wei JIN3   

  1. 1 School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
    2 School of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    3 Institute of Information Engineering,CAS,Beijing 100093,China
  • Revised:2018-01-10 Online:2018-02-01 Published:2018-03-28
  • Supported by:
    The National Key Research and Development Program of China(2016YFB0800303);The National Natural Science Foundation of China(61702266);The National Natural Science Foundation of China(61572255);The Natural Science Foundation of Jiangsu Province(BK20150787);The Natural Science Foundation of Jiangsu Province(BK20141404);The Natural Science Foundation of Beijing(4152048)

Abstract:

Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.

Key words: proxy re-encryption, multi-factor, access control, cloud computing, space-ground integration information network

CLC Number: 

No Suggested Reading articles found!