• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Cheng Fangquan, Peng Zhiyong, Song Wei, Wang Shulin, Cui Yihui. Key Management for Access Control in Trusted Cloud Storages[J]. Journal of Computer Research and Development, 2013, 50(8): 1613-1627.
Citation: Cheng Fangquan, Peng Zhiyong, Song Wei, Wang Shulin, Cui Yihui. Key Management for Access Control in Trusted Cloud Storages[J]. Journal of Computer Research and Development, 2013, 50(8): 1613-1627.

Key Management for Access Control in Trusted Cloud Storages

More Information
  • Published Date: August 14, 2013
  • In trusted cloud storage (TCS), for protecting the privacy of the sensitive outsourced cloud data, data owners locally encrypt their data before outsourcing. Through the secure management of the data keys, the selective access of outsourced data can be enforced in TCS scenarios. However, in TCS with multiple data owners, it remains a challenge to reduce users security risk and costs of key management as much as possible. In this paper, we propose a novel key management scheme based on global logical hierarchical graph (GLHG) for key derivation, which is used to enforce correctly the global authorization policies of all users. Our solution can achieve high efficiency by delegating the management of GLHG structure to cloud and adopting proxy re-encryption (PRE) technology. Additionally, this paper states the update policies for supporting dynamic access control. Finally, we show the benefits of our solution by experimentally evaluating quantitative criterions of key management.
  • Related Articles

    [1]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [2]Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke. Optimization for Broadcast Encryption in Cloud Using Extended Public Key[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824. DOI: 10.7544/issn1000-1239.2017.20170902
    [3]Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092
    [4]Ma Jun, Guo Yuanbo, Ma Jianfeng, Zhang Qi. A Time-Bound Hierarchical Access Control Scheme for Ubiquitous Sensing Network[J]. Journal of Computer Research and Development, 2017, 54(2): 328-337. DOI: 10.7544/issn1000-1239.2017.20150925
    [5]Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua. M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2109-2116.
    [6]Wang Lina, Ren Zhengwei, Dong Yongfeng, Yu Rongwei, Deng Ruyi. A Management Approach to Key-Used Times Based on Trusted Platform Module in Cloud Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1628-1636.
    [7]Ma Jun, Guo Yuanbo, Ma Jianfeng, Xiong Jinbo, Zhang Tao. A Hierarchical Access Control Scheme for Perceptual Layer of IoT[J]. Journal of Computer Research and Development, 2013, 50(6): 1267-1275.
    [8]Wang Gang, Wen Tao, Guo Quan, Ma Xuebin. An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks[J]. Journal of Computer Research and Development, 2010, 47(5): 911-920.
    [9]Chen Haikun, Shi Shengfei, and Li Jianzhong. A Key Management Scheme Based on Variable Transmission Range in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 165-171.
    [10]Feng Tao and Ma Jianfeng. A General Key Seed Management and Assignment Model for Wireless Sensor Networks and Application[J]. Journal of Computer Research and Development, 2008, 45(1): 146-153.

Catalog

    Article views (1035) PDF downloads (984) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return