<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn>
<publisher>
<publisher-name>VU</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFO1052</article-id><article-id pub-id-type="doi">10.15388/Informatica.2015.44</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Article</subject></subj-group></article-categories>
<title-group>
<article-title>Flexible Access Control over Verifiable Cloud Computing Services with Provable Security</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="Author">
<name><surname>Chang</surname><given-names>Ya-Fen</given-names></name><email xlink:href="mailto:cyf@cs.ccu.edu.tw">cyf@cs.ccu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
</contrib>
<aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan</aff>
</contrib-group>
<pub-date pub-type="epub"><day>01</day><month>01</month><year>2015</year></pub-date><volume>26</volume><issue>2</issue><fpage>181</fpage><lpage>198</lpage><history><date date-type="received"><day>01</day><month>07</month> <year>2013</year></date><date date-type="accepted"><day>01</day><month>03</month> <year>2014</year></date></history>
<permissions><copyright-statement>Vilnius University</copyright-statement><copyright-year>2015</copyright-year></permissions>
<abstract>
<label>Abstract</label>
<p>This paper proposes an access control mechanism of verifiable cloud computing services using chameleon hashing and Diffie–Hellman key exchange protocol. By this mechanism, an entity can apply for cloud computing services and he can authorize other users to access granted data or services. When an authorized user or entity wants to access cloud computing services, he can authenticate the cloud computing service provider. Moreover, no entity secret will be revealed by data kept by cloud servers such that security and cost saving can be both ensured. Security proof under the simulation paradigm is also given.</p>
</abstract>
<kwd-group>
<label>Keywords</label>
<kwd>cloud computing service</kwd>
<kwd>cloud computing</kwd>
<kwd>access control</kwd>
<kwd>chameleon hashing</kwd>
<kwd>Diffie–Hellman key exchange</kwd>
</kwd-group>
</article-meta>
</front>
</article>
