{"title":"An Efficient Credential-Based Scheme for Cross-Domain File Sharing","authors":"Lanxiang Chen, D. Feng","doi":"10.1109/CIS.2007.66","DOIUrl":null,"url":null,"abstract":"As cross-domain file sharing is important and existing schemes have some shortcomings, an efficient credential-based scheme is proposed in this paper. Symmetric-key credential, delegation without intervention of any centralized administrator, no need for traditional ACL and mapping remote group names to local identifiers are the features of the scheme. Symmetric-key credential is flexible, computationally efficient and can provide some useful revocation means. The way of no centralized administrator can ease management and administration overheads, and also avoid center point failure. The features of no need for traditional ACL and mapping remote group names to local identifiers have the advantage of reducing the burden of storage server. The processes of cross- domain delegation, authentication and revocation are discussed. And the security analysis indicates that the scheme is good.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2007.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As cross-domain file sharing is important and existing schemes have some shortcomings, an efficient credential-based scheme is proposed in this paper. Symmetric-key credential, delegation without intervention of any centralized administrator, no need for traditional ACL and mapping remote group names to local identifiers are the features of the scheme. Symmetric-key credential is flexible, computationally efficient and can provide some useful revocation means. The way of no centralized administrator can ease management and administration overheads, and also avoid center point failure. The features of no need for traditional ACL and mapping remote group names to local identifiers have the advantage of reducing the burden of storage server. The processes of cross- domain delegation, authentication and revocation are discussed. And the security analysis indicates that the scheme is good.