Fine-grained Access Control Scheme Based on Cloud Storage

Publications

Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science , Software Engineering

GET ALERTS

eISSN: 2470-8038

DESCRIPTION

2
Reader(s)
7
Visit(s)
0
Comment(s)
0
Share(s)

SEARCH WITHIN CONTENT

FIND ARTICLE

Volume / Issue / page

Related articles

VOLUME 2 , ISSUE 4 (December 2017) > List of articles

Fine-grained Access Control Scheme Based on Cloud Storage

Xiaojie Niu *

Keywords : access control, cloud computing, attribute encryption algorithm, CP-ABE encryption, cloud storage

Citation Information : International Journal of Advanced Network, Monitoring and Controls. Volume 2, Issue 4, Pages 207-210, DOI: https://doi.org/10.1109/iccnea.2017.48

License : (CC BY-NC-ND 4.0)

Published Online: 24-April-2018

ARTICLE

ABSTRACT

Cloud storage originates from cloud computing, and brings new model of data sharing and storage, which provided great convenience for users. However, cloud environment confronts with many problems, and one of the most important problems is the security problem. This paper researched on security problem based on encryption, and proposed a secure and efficient scheme according to system characteristics of data storage on cloud platform, and applied it in cloud storage system with fine-grained access control based on CP-ABE. Through the analysis and comparison, the experimental results showed that the proposed scheme optimized the user revocation, reduced the time of data owner to manage data, and realized the safe sharing and efficient storage of sensitive data in the public cloud storage. Finally, the technology in this paper was an optimization both on security and the whole expense, and it must have a good prospect in the future.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

Kelejian H H and Prucha I R,“Estimation of simultaneous systems of spatially interrelated cross sectional equations,”Journal of Econometrics, vol.118, pp.27-50, Jul. 2014.

 

Gebremariam G H, Gebremedhin T G and Schaeffer P V,“A simultaneous spatial panel data model of regional growth variation: An empirical analysis of employment, income, migration and local public services,”Computer Knowledge & Technology, vol.21, pp.34-38, Apr. 2015.

 

Guangnan Zhang, Computer Technology.Beijing: Metallurgic Industry Press, 2016.

 

Gebremariam G H, Gebremedhin T G, and Schaeffer P V,“Employment, income, migration and public services: A simultaneous spatial panel data model of regional growth,”Papers in Regional Science, vol.91, pp.275–297, Jun. 2014.

 

Cherubini U, Mulinacci S and Gobbi F. Dynamic Copula Methods Infinance,New York:John Wiley & Sons, 2015.

 

Fantazzini D. ,“Dynamic Copula Modelling for Value at Risk,” Frontiers in Finance & Economics, vol.45, pp.45-49, Jun. 2015.

 

Patton A J. ,“Modeling Asymmetric Exchange Rate Dependence,” International economic review, vol. 34, pp.80 -85, Jul. 2014.

 

Nelsen R B. An Introduction to Copulas.Springer,2014.

 

Chu Wenkui and zhang Fengming,“Based on the military software security problems of the COTS study,”Journal of Systems Engineering and Electronics, vol. 3, pp.2166-2170, Aug. 2014.

 

Tu Gang, zhang bo and Yang Fumin,“The research of embedded operating system transplant technology,”Computer application research, vol. 56, pp.83-85, Dec. 2014.

 

EXTRA FILES

COMMENTS