CORC  > 兰州理工大学  > 兰州理工大学
Based on the attribute encrypted cloud storage scheme
Zhu, Li-Ye
2013
会议日期June 21, 2013 - June 23, 2013
会议地点Shiyan, Hubei, China
关键词Cryptography Access control models Access control policies Ciphertexts Cloud storage services Cloud storages Conspiracy attack Formatting Security problems
DOI10.1109/ICCIS.2013.363
页码1372-1375
英文摘要With the wide application of cloud storage service, its security problem is apparent. The conspiracy resistance is a major problem. Aiming at this issue, we proposed a limited length of the ciphertext hidden control policies, which enhance the safety and at the same time improve efficiency. We establish cloud access control model, ABE encryption mode structure access control policies, and give the user revocation and access policies update method. Safety analysis shows that the scheme can resist conspiracy attack between users. © 2013 IEEE.
会议录Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013
会议录出版者IEEE Computer Society
语种英语
内容类型会议论文
源URL[http://ir.lut.edu.cn/handle/2XXMBERH/117583]  
专题兰州理工大学
作者单位School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China
推荐引用方式
GB/T 7714
Zhu, Li-Ye. Based on the attribute encrypted cloud storage scheme[C]. 见:. Shiyan, Hubei, China. June 21, 2013 - June 23, 2013.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace