Skip to main navigation Skip to search Skip to main content

A hierarchical CRT-based user access control scheme using resource set tree on the cloud system

  • Seungtae Hong
  • , Hyeong Il Kim
  • , Tae Hoon Kim
  • , Jae Woo Chang*
  • *Corresponding author for this work

    Research output: Contribution to conferenceConference paperpeer-review

    Abstract

    Recently, the cloud computing system has attracted much interest in processing the big data efficiently. Because services using big data on the cloud computing environment consider a lot of users, an efficient user access control scheme is required. However, the existing schemes have a critical problem that the cost of the key management for the user access control is high. To solve the problem, we propose a hierarchical Chinese Remainder Theorem (CRT) based user access control scheme using a resource set tree. The proposed scheme reduces the number of authentication keys based on a resource set tree by applying the minimum spanning tree. Finally, we show from the performance analysis that the proposed scheme outperforms the existing scheme in terms of both key generation cost and update cost.

    Original languageEnglish
    Title of host publication2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages87-94
    Number of pages8
    ISBN (Electronic)9781479973033
    DOIs
    StatePublished - 2015.03.30
    Event2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015 - Jeju, Korea, Republic of
    Duration: 2015.02.92015.02.11

    Publication series

    Name2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015

    Conference

    Conference2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015
    Country/TerritoryKorea, Republic of
    CityJeju
    Period15.02.915.02.11

    Keywords

    • Cloud Computing
    • Optimization of authentication key
    • User Access Control

    Quacquarelli Symonds(QS) Subject Topics

    • Computer Science & Information Systems

    Fingerprint

    Dive into the research topics of 'A hierarchical CRT-based user access control scheme using resource set tree on the cloud system'. Together they form a unique fingerprint.

    Cite this