Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 250-251.

Previous Articles     Next Articles

Research on Biometric Based Access Control for Cloud Storage

CHEN Zhi-jie,HUANG Kun and XIAN Ming   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Cloud computing is an arresting emerging computing paradigm that offers users on demand network access to a large shared pool of computing resources.How to strengthen the access control of cloud computing resources and protect sensitive data along with private key confidential against malicious servers or other external attackers,have been an important security problem.Biometric possesses notable advantage in this field,and hence this paper focused on leveraging biometric identity to achieve access control in cloud.We exploited and combined techniques of fuzzy identity based encryption(FIBE),biometric measurement,and key insulated encryption which enables augmenting the security of private key management.Specifically,we based on the idea that when every time legal user or malicious one makes the request of accessing data of his interest,and the cloud severs will update the corresponding header file which only the legal user has the ability to decrypt.

Key words: Cloud computing,Access control,Fuzzy identity based encryption,Key insulated encryption,Biometric

[1] Shamir A.Identity-Based cryptosystems and signature schemes[C]∥Procedings of the Crypto 1984 .volume 196 of LNCS,1984:47-53
[2] Itkis G,Reyzin L.SiBIR:Signer-base intrusion-resilient signa-tures [C]∥Procedings of the Crypto 2002.volume 2442 of LNCS,2002:499-514
[3] Dodis Y,Katz J,Xu S,et al.Key-Insulated Public-Key Cryptosystems[C]∥Procedings of EUROCRYPT 2002.volume 2332 of LNCS,2002:65-82
[4] Bellare M,Palacio.Protecting against key exposure:Stronglykey-insulated encryption with optimal threshold [EB/OL].[2002]http://eprint.iacr.org/2002/064
[5] Hanaoka,Imai.Parallel key-insulated public key encryption[C]∥Procedings of the PKC 2006.volume 3958 of LNCS,2006:105-122
[6] Katz D,Xu Yung.Strong key-insulated signature schemes [C]∥Procedings of the PKC 2003.volume 2567 of LNCS,2003:130-144
[7] Le Z,Ouyang Y,Ford J,et al.hierarchical key-insulated signature scheme in the CA trust model [M]∥Information Security and Cryptology.Springer,2006
[8] Zhou Y,Cao Z,Chai Z.Identity based key insulated signature [C]∥Procedings of the ISPEC 2006.volume 3903 of LNCS,2006:226-234
[9] Sahai A,Waters B.Fuzzy Identity Based Encryption [C]∥Proceedings of EUROCRYPT 2005.volume 3494 of LNCS,2005:457-473

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!