Reference Hub1
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing

Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing

Azin Moradbeikie, Saied Abrishami, Hasan Abbasi
Copyright: © 2016 |Volume: 10 |Issue: 4 |Pages: 14
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466689718|DOI: 10.4018/IJISP.2016100103
Cite Article Cite Article

MLA

Moradbeikie, Azin, et al. "Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing." IJISP vol.10, no.4 2016: pp.44-57. http://doi.org/10.4018/IJISP.2016100103

APA

Moradbeikie, A., Abrishami, S., & Abbasi, H. (2016). Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing. International Journal of Information Security and Privacy (IJISP), 10(4), 44-57. http://doi.org/10.4018/IJISP.2016100103

Chicago

Moradbeikie, Azin, Saied Abrishami, and Hasan Abbasi. "Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing," International Journal of Information Security and Privacy (IJISP) 10, no.4: 44-57. http://doi.org/10.4018/IJISP.2016100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Nowadays, Cloud Computing is considered one of the important fields in both research and industry. Users enjoy membership of cloud providing effective services called time-limited services. This paper addresses time-limited services offering an attribute-based access control method and time-limited attributes providing users' time-limited membership in cloud service. The proposed method authenticates users for specific time limit after which they are considered invalid. This method is decentralized resistible against backward and forward attacks. Moreover, this approach compared to other approaches reduces calculation and communication overhead.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.