Secure Hierarchical Key Management for Cloud Computing
文献类型:会议论文
作者 | Liu Jin; Sun Jing; Yow KinChoong; Peng XianBin; Destech Publicat Inc |
出版日期 | 2015 |
会议名称 | International Conference on Computer Networks and Information Security (CNIS 2015) |
会议地点 | 399-405 |
英文摘要 | There are tremendously large amount of files in the cloud, and if we encrypt them one by one, there must be the same amount of keys we should manage safely. One important key management approach is centralized key management, which employs a centralized key server to update and assign the data encryption key to the legitimate users via rekey messages. However, users may have different access rights to multiple data streams, forming a partially ordered hierarchy for users. Hence, we need hierarchicalaccess control schemes for the partially ordered user hierarchy. This paper analyses two well-knownhierarchical access control algorithms and points out the security weakness. We show that their schemes are susceptible to attacks such as the ex-member attack and the collusion attack. We propose a modification to their algorithm. |
收录类别 | ISTP |
语种 | 英语 |
源URL | [http://ir.siat.ac.cn:8080/handle/172644/7002] ![]() |
专题 | 深圳先进技术研究院_数字所 |
作者单位 | 2015 |
推荐引用方式 GB/T 7714 | Liu Jin,Sun Jing,Yow KinChoong,et al. Secure Hierarchical Key Management for Cloud Computing[C]. 见:International Conference on Computer Networks and Information Security (CNIS 2015). 399-405. |
入库方式: OAI收割
来源:深圳先进技术研究院
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。