A hierarchical data access and key management in cloud computing

被引:0
|
作者
Sun, Tsuei-Hung [1 ]
Hwang, Min-Shiang [2 ]
机构
[1] Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung 402, Taiwan
[2] Department of Computer Science and Information Engineering, Asia University, 500 Liufeng Road, Wufeng, Taichung 402, Taiwan
来源
ICIC Express Letters | 2012年 / 6卷 / 02期
关键词
Problem solving - Cloud storage - Cryptography - Information management;
D O I
暂无
中图分类号
学科分类号
摘要
Since cloud storage becomes a major application in cloud computing, many researches have been focusing on how to protect and verify the data stored in the Cloud. There is a problem that the owner does not want the real data stored by the Cloud to be Cloud known. Therefore, the most popular way is to encrypt entire file by using a secret key like Amazon Simple Storage Service (S3) [1]; however, it may bring some problems such as secret key change and distribution, key management, and access rights management. So, we propose a hierarchical key management scheme to solve the problems mentioned above. And this scheme is suitable for individuals or enterprise service providers to manage their keys of files, software and services. © 2012 ICIC International.
引用
收藏
页码:569 / 574
相关论文
共 50 条
  • [1] Secure Hierarchical Key Management for Cloud Computing
    Liu, Jin
    Sun, Jing
    Yow, Kin-Choong
    Peng, Xian-Bin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 399 - 405
  • [2] Protecting outsourced data in cloud computing through access management
    Wang, Hua
    Yi, Xun
    Bertino, Elisa
    Sun, Lili
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (03): : 600 - 615
  • [3] Key techniques of access control for cloud computing
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Qing, Yu
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02): : 312 - 319
  • [4] Trust Management Approach for Secure and Privacy Data Access in Cloud Computing
    Mythili, K.
    Anandakumar, H.
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 923 - 927
  • [5] Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment
    Huang, Jyun-Yao
    Liao, I-En
    Chiang, Chen-Kang
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 883 - 887
  • [6] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [7] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [8] Cloud Computing and Data Management
    Dubey, Vigya
    Agrawal, Pranjal
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [9] An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing
    Liu, Chang
    Zhang, Xuyun
    Liu, Chengfei
    Yang, Yun
    Ranjan, Rajiv
    Georgakopoulos, Dimitrios
    Chen, Jinjun
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 9 - 16
  • [10] Enforcing Scalable and Dynamic Hierarchical Access Control in Cloud Computing
    Yang, Ran
    Lin, Chuang
    Jiang, Yixin
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,