Lanzhou University of Technology Institutional Repository (LUT_IR)
Based on the attribute encrypted cloud storage scheme | |
Zhu, Li-Ye | |
2013 | |
会议名称 | 2013 5th International Conference on Computational and Information Sciences, ICCIS 2013 |
会议录名称 | Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013 |
页码 | 1372-1375 |
会议日期 | June 21, 2013 - June 23, 2013 |
会议地点 | Shiyan, Hubei, China |
出版者 | IEEE Computer Society |
摘要 | With the wide application of cloud storage service, its security problem is apparent. The conspiracy resistance is a major problem. Aiming at this issue, we proposed a limited length of the ciphertext hidden control policies, which enhance the safety and at the same time improve efficiency. We establish cloud access control model, ABE encryption mode structure access control policies, and give the user revocation and access policies update method. Safety analysis shows that the scheme can resist conspiracy attack between users. © 2013 IEEE. |
关键词 | Cryptography Access control models Access control policies Ciphertexts Cloud storage services Cloud storages Conspiracy attack Formatting Security problems |
DOI | 10.1109/ICCIS.2013.363 |
收录类别 | EI |
语种 | 英语 |
EI入藏号 | 20135217146635 |
EI主题词 | Access control |
来源库 | Compendex |
分类代码 | 723 Computer Software, Data Handling and Applications |
引用统计 | 无
|
文献类型 | 会议论文 |
条目标识符 | https://ir.lut.edu.cn/handle/2XXMBERH/117583 |
专题 | 兰州理工大学 |
作者单位 | School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China |
第一作者单位 | 兰州理工大学 |
推荐引用方式 GB/T 7714 | Zhu, Li-Ye. Based on the attribute encrypted cloud storage scheme[C]:IEEE Computer Society,2013:1372-1375. |
条目包含的文件 | 条目无相关文件。 |
个性服务 |
查看访问统计 |
谷歌学术 |
谷歌学术中相似的文章 |
[Zhu, Li-Ye]的文章 |
百度学术 |
百度学术中相似的文章 |
[Zhu, Li-Ye]的文章 |
必应学术 |
必应学术中相似的文章 |
[Zhu, Li-Ye]的文章 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论