作者: Atanu Basu , Indranil Sengupta , Jamuna Kanta Sing
DOI: 10.1007/978-3-642-25560-1_12
关键词: Computer network 、 Elliptic curve cryptography 、 Computer science 、 End user 、 Cloud computing 、 Key management 、 Key generation 、 Service provider 、 Cloud storage 、 Encryption 、 Computer security
摘要: In our proposed scheme, the data owner outsources huge volume of to a cloud storage provider and end users request owner. The encrypts before sending it service does over-encryption by Vimercati et al. [4] outsourced encrypted users. We incorporate an existing Elliptic Curve Cryptography (ECC) based key management scheme in user hierarchy Nikooghadam [11] which classifies security classes efficiently helps derive secret keys lower order classes. component will not have perform any extra work except storing this reduces cost as per pay-per-use pricing policy provider. Our incurs low overhead for generation well its can use wireless mobile devices. is useful owner-write-users-read applications secured from adversaries.