Flexible Access Control over Verifiable Cloud Computing Services with Provable Security
Volume 26, Issue 2 (2015), pp. 181–198
Pub. online: 1 January 2015
Type: Article
Received
1 July 2013
1 July 2013
Accepted
1 March 2014
1 March 2014
Published
1 January 2015
1 January 2015
Abstract
Abstract
This paper proposes an access control mechanism of verifiable cloud computing services using chameleon hashing and Diffie–Hellman key exchange protocol. By this mechanism, an entity can apply for cloud computing services and he can authorize other users to access granted data or services. When an authorized user or entity wants to access cloud computing services, he can authenticate the cloud computing service provider. Moreover, no entity secret will be revealed by data kept by cloud servers such that security and cost saving can be both ensured. Security proof under the simulation paradigm is also given.