期刊名称:International Journal of Computer Trends and Technology
电子版ISSN:2231-2803
出版年度:2013
卷号:4
期号:5-3
出版社:Seventh Sense Research Group
摘要:Cloud computing offers many advantages, such as data ubiquity, flexibility of access, better performance and low start up cost. However, this introduces new challenges. The main challenge is the owner’s loss of control of his data and the reliance on the trustworthiness of the service provider. Secure access control policies, data integrity check and data privacy techniques to hide the data from the service provider needs to be implemented. Simply encrypting the data is inefficient and is vulnerable to attacks when the access control policies change. Several techniques have been proposed to address these issues. This paper presents a novel and efficient solution that employs two layers of encryption of the data and an encrypted data object containing the second access key. Changes to the access control policies are handled by reencrypting the object containing the affected key, which is an efficient operation than reencrypting the whole data.
关键词:Cloud computing; Outsourced Data; Data Security and Privacy; confidentiality; Access Control