k-Times Attribute-Based Anonymous Access Control for Cloud Computing

@article{Yuen2015kTimesAA,
  title={k-Times Attribute-Based Anonymous Access Control for Cloud Computing},
  author={Tsz Hon Yuen and Joseph K. Liu and Man Ho Au and Xinyi Huang and Willy Susilo and Jianying Zhou},
  journal={IEEE Trans. Computers},
  year={2015},
  volume={64},
  pages={2595-2608}
}
In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a ktimes limit for anonymous access control. That is, the server may limit a particular… CONTINUE READING

5 Figures & Tables

Topics

Statistics

01020201620172018
Citations per Year

Citation Velocity: 7

Averaging 7 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.