A hierarchical data access and key management in cloud computing

被引:0
|
作者
Sun, Tsuei-Hung [1 ]
Hwang, Min-Shiang [2 ]
机构
[1] Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung 402, Taiwan
[2] Department of Computer Science and Information Engineering, Asia University, 500 Liufeng Road, Wufeng, Taichung 402, Taiwan
来源
ICIC Express Letters | 2012年 / 6卷 / 02期
关键词
Problem solving - Cloud storage - Cryptography - Information management;
D O I
暂无
中图分类号
学科分类号
摘要
Since cloud storage becomes a major application in cloud computing, many researches have been focusing on how to protect and verify the data stored in the Cloud. There is a problem that the owner does not want the real data stored by the Cloud to be Cloud known. Therefore, the most popular way is to encrypt entire file by using a secret key like Amazon Simple Storage Service (S3) [1]; however, it may bring some problems such as secret key change and distribution, key management, and access rights management. So, we propose a hierarchical key management scheme to solve the problems mentioned above. And this scheme is suitable for individuals or enterprise service providers to manage their keys of files, software and services. © 2012 ICIC International.
引用
收藏
页码:569 / 574
相关论文
共 50 条
  • [31] HITCloud: Novel Hierarchical Model for Trust Management in Cloud Computing
    Mohammadnia, Hamzeh
    Shakeri, Hassan
    2014 INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK), 2014,
  • [32] A Higher-Level Security Scheme for Key Access on Cloud Computing
    Celiktas, Baris
    Celikbilek, Ibrahim
    Ozdemir, Enver
    IEEE ACCESS, 2021, 9 : 107347 - 107359
  • [33] The research of complex product data warehouse architecture and key management technology based on cloud computing
    Chen, Zhengmao
    INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 509 - 516
  • [34] Hierarchical data replication strategy to improve performance in cloud computing
    Mansouri, Najme
    Javidi, Mohammad Masoud
    Zade, Behnam Mohammad Hasani
    FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (02)
  • [35] Hierarchical data replication strategy to improve performance in cloud computing
    Najme Mansouri
    Mohammad Masoud Javidi
    Behnam Mohammad Hasani Zade
    Frontiers of Computer Science, 2021, 15
  • [36] Hierarchical data replication strategy to improve performance in cloud computing
    Najme MANSOURI
    Mohammad Masoud JAVIDI
    Behnam Mohammad Hasani ZADE
    Frontiers of Computer Science, 2021, (02) : 62 - 78
  • [37] Key Derivation Policy for data security and data integrity in cloud computing
    Senthil Kumari P.
    Nadira Banu Kamal A.R.
    Automatic Control and Computer Sciences, 2016, 50 (3) : 165 - 178
  • [38] Data Flow Management and Compliance in Cloud Computing
    Singh, Jatinder
    Powles, Julia
    Pasquier, Thomas
    Bacon, Jean
    IEEE CLOUD COMPUTING, 2015, 2 (04): : 24 - 32
  • [39] Encrypted Data Management with Deduplication in Cloud Computing
    Yan, Zheng
    Wang, Mingjun
    Li, Yuxiang
    Vasilakos, Athanasios V.
    IEEE CLOUD COMPUTING, 2016, 3 (02): : 28 - 35
  • [40] Intelligent Data Management and Security in Cloud Computing
    Ogiela, Lidia
    Ogiela, Marek R.
    Ko, Hoon
    SENSORS, 2020, 20 (12) : 1 - 11