Based on the attribute encrypted cloud storage scheme | |
Zhu, Li-Ye | |
2013 | |
会议日期 | June 21, 2013 - June 23, 2013 |
会议地点 | Shiyan, Hubei, China |
关键词 | Cryptography Access control models Access control policies Ciphertexts Cloud storage services Cloud storages Conspiracy attack Formatting Security problems |
DOI | 10.1109/ICCIS.2013.363 |
页码 | 1372-1375 |
英文摘要 | With the wide application of cloud storage service, its security problem is apparent. The conspiracy resistance is a major problem. Aiming at this issue, we proposed a limited length of the ciphertext hidden control policies, which enhance the safety and at the same time improve efficiency. We establish cloud access control model, ABE encryption mode structure access control policies, and give the user revocation and access policies update method. Safety analysis shows that the scheme can resist conspiracy attack between users. © 2013 IEEE. |
会议录 | Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013 |
会议录出版者 | IEEE Computer Society |
语种 | 英语 |
内容类型 | 会议论文 |
源URL | [http://ir.lut.edu.cn/handle/2XXMBERH/117583] |
专题 | 兰州理工大学 |
作者单位 | School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China |
推荐引用方式 GB/T 7714 | Zhu, Li-Ye. Based on the attribute encrypted cloud storage scheme[C]. 见:. Shiyan, Hubei, China. June 21, 2013 - June 23, 2013. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论