Secured cloud storage scheme using ECC based key management in user hierarchy

作者: Atanu Basu , Indranil Sengupta , Jamuna Kanta Sing

DOI: 10.1007/978-3-642-25560-1_12

关键词: Computer networkElliptic curve cryptographyComputer scienceEnd userCloud computingKey managementKey generationService providerCloud storageEncryptionComputer security

摘要: In our proposed scheme, the data owner outsources huge volume of to a cloud storage provider and end users request owner. The encrypts before sending it service does over-encryption by Vimercati et al. [4] outsourced encrypted users. We incorporate an existing Elliptic Curve Cryptography (ECC) based key management scheme in user hierarchy Nikooghadam [11] which classifies security classes efficiently helps derive secret keys lower order classes. component will not have perform any extra work except storing this reduces cost as per pay-per-use pricing policy provider. Our incurs low overhead for generation well its can use wireless mobile devices. is useful owner-write-users-read applications secured from adversaries.

参考文章(26)
Seny Kamara, Kristin Lauter, Cryptographic Cloud Storage Financial Cryptography and Data Security. ,vol. 6054, pp. 136- 149 ,(2010) , 10.1007/978-3-642-14992-4_13
Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui, A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer public key cryptography. pp. 182- 194 ,(1998) , 10.1007/BFB0054024
Stefano Paraboschi, Sara Foresti, Sabrina De Capitani di Vimercati, Sushil Jajodia, Pierangela Samarati, Over-encryption: management of access control evolution on outsourced data very large data bases. pp. 123- 134 ,(2007)
E. Damiani, S. De Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing information security conference. ,vol. 232, pp. 385- 396 ,(2007) , 10.1007/978-0-387-72367-9_33
Joseph Bonneau, Mike Just, Greg Matthews, What's in a name? Evaluating statistical attacks on personal knowledge questions financial cryptography. pp. 98- 113 ,(2010) , 10.1007/978-3-642-14577-3_10
Kevin Fu, Ram Swaminathan, Erik Riedel, Qian Wang, Mahesh Kallahalla, Plutus: Scalable Secure File Sharing on Untrusted Storage file and storage technologies. pp. 3- 3 ,(2003)
Xiaofeng Meng, Min Xie, Haixun Wang, Jian Yin, Integrity auditing of outsourced data very large data bases. pp. 782- 793 ,(2007)
Selim G. Akl, Peter D. Taylor, Cryptographic Solution to a Multilevel Security Problem international cryptology conference. pp. 237- 249 ,(1983) , 10.1007/978-1-4757-0602-4_23
Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Athos: Efficient Authentication of Outsourced File Systems Lecture Notes in Computer Science. pp. 80- 96 ,(2008) , 10.1007/978-3-540-85886-7_6