IR
Based on the attribute encrypted cloud storage scheme
Zhu, Li-Ye
2013
会议名称2013 5th International Conference on Computational and Information Sciences, ICCIS 2013
会议录名称Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013
页码1372-1375
会议日期June 21, 2013 - June 23, 2013
会议地点Shiyan, Hubei, China
出版者IEEE Computer Society
摘要With the wide application of cloud storage service, its security problem is apparent. The conspiracy resistance is a major problem. Aiming at this issue, we proposed a limited length of the ciphertext hidden control policies, which enhance the safety and at the same time improve efficiency. We establish cloud access control model, ABE encryption mode structure access control policies, and give the user revocation and access policies update method. Safety analysis shows that the scheme can resist conspiracy attack between users. © 2013 IEEE.
关键词Cryptography Access control models Access control policies Ciphertexts Cloud storage services Cloud storages Conspiracy attack Formatting Security problems
DOI10.1109/ICCIS.2013.363
收录类别EI
语种英语
EI入藏号20135217146635
EI主题词Access control
来源库Compendex
分类代码723 Computer Software, Data Handling and Applications
引用统计
文献类型会议论文
条目标识符https://ir.lut.edu.cn/handle/2XXMBERH/117583
专题兰州理工大学
作者单位School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China
第一作者单位兰州理工大学
推荐引用方式
GB/T 7714
Zhu, Li-Ye. Based on the attribute encrypted cloud storage scheme[C]:IEEE Computer Society,2013:1372-1375.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Zhu, Li-Ye]的文章
百度学术
百度学术中相似的文章
[Zhu, Li-Ye]的文章
必应学术
必应学术中相似的文章
[Zhu, Li-Ye]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。