A hierarchical data access and key management in cloud computing

被引:0
|
作者
Sun, Tsuei-Hung [1 ]
Hwang, Min-Shiang [2 ]
机构
[1] Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung 402, Taiwan
[2] Department of Computer Science and Information Engineering, Asia University, 500 Liufeng Road, Wufeng, Taichung 402, Taiwan
来源
ICIC Express Letters | 2012年 / 6卷 / 02期
关键词
Problem solving - Cloud storage - Cryptography - Information management;
D O I
暂无
中图分类号
学科分类号
摘要
Since cloud storage becomes a major application in cloud computing, many researches have been focusing on how to protect and verify the data stored in the Cloud. There is a problem that the owner does not want the real data stored by the Cloud to be Cloud known. Therefore, the most popular way is to encrypt entire file by using a secret key like Amazon Simple Storage Service (S3) [1]; however, it may bring some problems such as secret key change and distribution, key management, and access rights management. So, we propose a hierarchical key management scheme to solve the problems mentioned above. And this scheme is suitable for individuals or enterprise service providers to manage their keys of files, software and services. © 2012 ICIC International.
引用
收藏
页码:569 / 574
相关论文
共 50 条
  • [21] A secure and lightweight cloud data deduplication scheme with efficient access control and key management
    Tang, Xinyu
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Jiang, Xueru
    Liu, Yining
    COMPUTER COMMUNICATIONS, 2024, 222 : 209 - 219
  • [22] Hierarchical Key Management Scheme with Multilevel Secure Access
    Ma, Mingxin
    Yang, Xiaotong
    Shi, Guozhen
    Li, Fenghua
    2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 97 - 102
  • [23] A centralized key management scheme for hierarchical access control
    Zhang, Q
    Wang, YK
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2067 - 2071
  • [24] DACPCC: A Data Access Control Scheme with Access Permission for Cloud Computing
    Wang Y.-D.
    Yang J.-H.
    Yang, Jia-Hai (yang@cernet.edu.cn), 2018, Chinese Institute of Electronics (46): : 236 - 244
  • [25] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [26] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [27] An efficient signcryption for data access control in cloud computing
    Fagen Li
    Bo Liu
    Jiaojiao Hong
    Computing, 2017, 99 : 465 - 479
  • [28] An efficient signcryption for data access control in cloud computing
    Li, Fagen
    Liu, Bo
    Hong, Jiaojiao
    COMPUTING, 2017, 99 (05) : 465 - 479
  • [29] Key management for access control in trusted cloud storages
    Song, W. (songwei@whu.edu.cn), 1613, Science Press (50):
  • [30] Energy Efficient Hierarchical Resource Management for Mobile Cloud Computing
    Ahmad, Awais
    Paul, Anand
    Khan, Muard
    Jabbar, Sohail
    Rathore, Muhammad Mazhar Ullah
    Chilamkurti, Naveen
    Min-Allah, Nasro
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2017, 2 (02): : 100 - 112