Главная
Study mode:
on
1
Introduction
2
Cloud Data Outsourcing
3
Traditional Access Control
4
Advanced Cryptography
5
Cost of Advanced Cryptography
6
Overview
7
System Model
8
RoleBased Access Control
9
RoleBased Encryption
10
Revoking Access
11
Using Key Versioning
12
Evaluation
13
Reallife APIs
14
Cost of Revocation
15
Revocation Frequency
16
Lazy Encryption
17
Delaying State Change
18
Advanced Crypto
19
Future Research
20
Conclusion
Description:
Explore the challenges and practicality of cryptographically enforcing dynamic access control policies in cloud environments in this 20-minute IEEE conference talk. Delve into the complexities of maintaining confidentiality and robust access controls on cloud-hosted data, examining the use of advanced cryptographic techniques such as identity-based encryption and attribute-based encryption. Analyze the computational costs associated with implementing dynamic access controls on untrusted platforms, focusing on role-based access control (RBAC0) enforcement using identity-based and public-key cryptography. Discover the potential bottlenecks and prohibitive overheads in realistic scenarios, particularly when supporting revocation and file updates. Gain insights into future research directions for developing more efficient and natural constructions for cryptographic enforcement of dynamic access controls in cloud computing.

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud

IEEE
Add to list
0:00 / 0:00