Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016 (2016), Article ID 5232846, 9 pages
http://dx.doi.org/10.1155/2016/5232846
Research Article

F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

School of Computer Science, China University of Geosciences, Wuhan 430074, China

Received 6 September 2015; Revised 11 November 2015; Accepted 19 November 2015

Academic Editor: Jong-Hyouk Lee

Copyright © 2016 Wei Ren et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Li and X. Zhao, “Survey on access control model in cloud computing environment,” in Proceedings of the International Conference on Cloud Computing and Big Data (CloudCom-Asia '13), pp. 340–345, IEEE, Fuzhou, China, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. X. Yao, X. Han, and X. Du, “A lightweight access control mechanism for mobile cloud computing,” in Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM '14), pp. 380–385, April 2014.
  3. T. Jung, X.-Y. Li, Z. Wan, and M. Wan, “Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 190–199, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Ruj, M. Stojmenovic, and A. Nayak, “Decentralized access control with anonymous authentication of data stored in clouds,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 384–394, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Ghafoor, M. Irum, and M. Qaisar, “User centric access control policy management framework for cloud applications,” in Proceedings of the 2nd National Conference on Information Assurance (NCIA '13), pp. 135–140, IEEE, Rawalpindi, Pakistan, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure overlay cloud storage with access control and assured deletion,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903–916, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Habiba, M. R. Islam, and A. B. M. S. Ali, “Access control management for cloud,” in Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '13), pp. 485–492, IEEE, Melbourne, VIC, Australia, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. Z. Wan, J. Liu, and R. H. Deng, “HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743–754, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Hajivali, M. T. Alrashdan, F. Fatemi Moghaddam, and A. Z. M. Alothmani, “Applying an agent-based user authentication and access control model for cloud servers,” in Proceedings of the International Conference on ICT Convergence (ICTC '13), pp. 807–812, IEEE, Jeju, South Korea, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. P. Ortiz, O. Lazaro, M. Uriarte, and M. Carnerero, “Enhanced multi-domain access control for secure mobile collaboration through linked data cloud in manufacturing,” in Proceedings of the IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '13), pp. 1–9, IEEE, Madrid, Spain, June 2013. View at Publisher · View at Google Scholar
  11. Z. Lv, C. Hong, M. Zhang, and D. Feng, “A secure and efficient revocation scheme for fine-grained access control in cloud storage,” in Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom '12), pp. 545–550, Taipei, Taiwan, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. R. Yang, C. Lin, and Y. Jiang, “Enforcing scalable and dynamic hierarchical access control in cloud computing,” in Proceedings of the IEEE International Conference on Communications (ICC '12), pp. 923–927, IEEE, Ottawa, Canada, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Shen, J. Shu, and W. Xue, “Keyword search with access control over encrypted data in cloud computing,” in Proceedings of the 22nd IEEE International Symposium of Quality of Service (IWQoS '14), pp. 87–92, Hong Kong, May 2014. View at Publisher · View at Google Scholar · View at Scopus