Advanced Search
    Cheng Fangquan, Peng Zhiyong, Song Wei, Wang Shulin, Cui Yihui. Key Management for Access Control in Trusted Cloud Storages[J]. Journal of Computer Research and Development, 2013, 50(8): 1613-1627.
    Citation: Cheng Fangquan, Peng Zhiyong, Song Wei, Wang Shulin, Cui Yihui. Key Management for Access Control in Trusted Cloud Storages[J]. Journal of Computer Research and Development, 2013, 50(8): 1613-1627.

    Key Management for Access Control in Trusted Cloud Storages

    • In trusted cloud storage (TCS), for protecting the privacy of the sensitive outsourced cloud data, data owners locally encrypt their data before outsourcing. Through the secure management of the data keys, the selective access of outsourced data can be enforced in TCS scenarios. However, in TCS with multiple data owners, it remains a challenge to reduce users security risk and costs of key management as much as possible. In this paper, we propose a novel key management scheme based on global logical hierarchical graph (GLHG) for key derivation, which is used to enforce correctly the global authorization policies of all users. Our solution can achieve high efficiency by delegating the management of GLHG structure to cloud and adopting proxy re-encryption (PRE) technology. Additionally, this paper states the update policies for supporting dynamic access control. Finally, we show the benefits of our solution by experimentally evaluating quantitative criterions of key management.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return