Skip to main content

Research of ABAC Mechanism Based on the Improved Encryption Algorithm Under Cloud Environment

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 331))

Abstract

To solve the data security problem based on the Attribute Based Access Control (ABAC) mechanism, an improved CP-ABE algorithm which is applicable to ABAC environment is proposed. The research is done from two aspects of access system structure and formal definition to study the ABAC mechanism. Then the formal definition of improved algorithm is given. The simulation and performance analysis is also finished. The algorithm has less storage consumption and higher efficiency under ABAC environment through the comparison with traditional CP-ABE algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sandhu R, Coyne E, Feinstein H et al (1996) Role-based access control models. IEEE Comput 29(2):38–47

    Article  Google Scholar 

  2. Sandhu R, Bhamidipati V, Munawer Q (1999) The ARBAC97 model for role-based administration of roles. ACM Trans Inf Syst Secur 2(1):105–135

    Article  Google Scholar 

  3. Oh S, Sandhu R, Zhang XW (2006) An effective role administration model using organization structure. ACM Trans Inf Syst Secur 9(2):113–137

    Article  Google Scholar 

  4. Zhang B, Zhang Y (2012) Based on the properties and role access control model. Comput Eng Des 33(10):3807–3813

    Google Scholar 

  5. Wang XM, Fu H, Zhang LC (2010) Based on the attributes of the access control research progress. J Electron 38(7):1660–1668

    Google Scholar 

  6. Cheng XR, Chen XY, Zhang B, Yang Y (2010) The access control policy model based on attribute. Comput Eng 36(15):131–134

    Google Scholar 

  7. Chen WP, Wang NN (2013) Based on the research of XACML strategy evaluation optimization technique. Comput Appl Res 30(3):900–906

    Google Scholar 

  8. Gao Y, Zhang GY, Wu M (2006) Based on the XACML and RBAC access control system. J Comput Appl Softw 23(8):65–67

    Google Scholar 

  9. Zhang HJ, Fan XF (2013) A trusted third party based on the CP-ABE cloud storage access control. J Wuhan Univ 59(2):153–158

    Google Scholar 

  10. Sun GZ, Dong Y, Li Y (2011) Cloud storage based on CP-ABE algorithm data access control. J Commun 32(7):146–153

    Google Scholar 

  11. Song KB, Luo J, Sun JT (2012) Based on cloud storage data protection mechanism of CP-ABE algorithm. J Huazhong Univ Sci Technol 40(SI):266–270

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Long-xiang Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Zhang, Lx., Zou, Js. (2015). Research of ABAC Mechanism Based on the Improved Encryption Algorithm Under Cloud Environment. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_46

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-9618-7_46

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-9617-0

  • Online ISBN: 978-94-017-9618-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics