A hierarchical data access and key management in cloud computing

被引:0
|
作者
Sun, Tsuei-Hung [1 ]
Hwang, Min-Shiang [2 ]
机构
[1] Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung 402, Taiwan
[2] Department of Computer Science and Information Engineering, Asia University, 500 Liufeng Road, Wufeng, Taichung 402, Taiwan
来源
ICIC Express Letters | 2012年 / 6卷 / 02期
关键词
Problem solving - Cloud storage - Cryptography - Information management;
D O I
暂无
中图分类号
学科分类号
摘要
Since cloud storage becomes a major application in cloud computing, many researches have been focusing on how to protect and verify the data stored in the Cloud. There is a problem that the owner does not want the real data stored by the Cloud to be Cloud known. Therefore, the most popular way is to encrypt entire file by using a secret key like Amazon Simple Storage Service (S3) [1]; however, it may bring some problems such as secret key change and distribution, key management, and access rights management. So, we propose a hierarchical key management scheme to solve the problems mentioned above. And this scheme is suitable for individuals or enterprise service providers to manage their keys of files, software and services. © 2012 ICIC International.
引用
收藏
页码:569 / 574
相关论文
共 50 条
  • [41] Maternity Data Management Utilizing Cloud Computing
    San, Oh Ying
    Husain, Wahidah
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [42] Cloud Computing: The Future of Big Data Management
    Ouf, Shimaa
    Nasr, Mona
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2015, 5 (02) : 53 - 61
  • [43] "Big" Data Management in Cloud Computing Environment
    Agarwal, Mohit
    Srivastava, Gur Mauj Saran
    HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 707 - 716
  • [44] Data Management Challenges in Cloud Computing Infrastructures
    Agrawal, Divyakant
    El Abbadi, Amr
    Antony, Shyam
    Das, Sudipto
    DATABASES IN NETWORKED INFORMATION SYSTEMS, PROCEEDINGS, 2010, 5999 : 1 - 10
  • [45] A hierarchical group key agreement protocol using orientable attributes for cloud computing
    Zhang, Qikun
    Wang, Xianmin
    Yuan, Junling
    Liu, Lu
    Wang, Ruifang
    Huang, Hong
    Li, Yuanzhang
    INFORMATION SCIENCES, 2019, 480 : 55 - 69
  • [46] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [47] Hierarchical Access Control with Scalable Data Sharing in Cloud Storage
    Qiu, Zhenyao
    Zhang, Zhiwei
    Tan, Shichong
    Wang, Jianfeng
    Tao, Xiaoling
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (03): : 663 - 676
  • [48] KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING
    Delgado Barroso, John Manuel
    Joyanes Aguilar, Luis
    Garcia Gundin, Pablo
    KEOD 2010: Proceedings of the International Conference on Knowledge Engineering and Ontology Development, 2010, : 493 - 496
  • [49] A Way of Key Management in Cloud Storage Based on Trusted Computing
    Yang, Xin
    Shen, Qingni
    Yang, Yahui
    Qing, Sihan
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
  • [50] Extending Access Management to maintain audit logs in cloud computing
    Prasad, Ajay
    Chakrabarti, Prasun
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (03) : 144 - 147