Xi'an Technological University
Subject: Computer Science, Software Engineering
eISSN: 2470-8038
SEARCH WITHIN CONTENT
Keywords : access control, cloud computing, attribute encryption algorithm, CP-ABE encryption, cloud storage
Citation Information : International Journal of Advanced Network, Monitoring and Controls. Volume 2, Issue 4, Pages 207-210, DOI: https://doi.org/10.1109/iccnea.2017.48
License : (CC BY-NC-ND 4.0)
Published Online: 24-April-2018
Cloud storage originates from cloud computing, and brings new model of data sharing and storage, which provided great convenience for users. However, cloud environment confronts with many problems, and one of the most important problems is the security problem. This paper researched on security problem based on encryption, and proposed a secure and efficient scheme according to system characteristics of data storage on cloud platform, and applied it in cloud storage system with fine-grained access control based on CP-ABE. Through the analysis and comparison, the experimental results showed that the proposed scheme optimized the user revocation, reduced the time of data owner to manage data, and realized the safe sharing and efficient storage of sensitive data in the public cloud storage. Finally, the technology in this paper was an optimization both on security and the whole expense, and it must have a good prospect in the future.
Kelejian H H and Prucha I R,“Estimation of simultaneous systems of spatially interrelated cross sectional equations,”Journal of Econometrics, vol.118, pp.27-50, Jul. 2014.
Gebremariam G H, Gebremedhin T G and Schaeffer P V,“A simultaneous spatial panel data model of regional growth variation: An empirical analysis of employment, income, migration and local public services,”Computer Knowledge & Technology, vol.21, pp.34-38, Apr. 2015.
Guangnan Zhang, Computer Technology.Beijing: Metallurgic Industry Press, 2016.
Gebremariam G H, Gebremedhin T G, and Schaeffer P V,“Employment, income, migration and public services: A simultaneous spatial panel data model of regional growth,”Papers in Regional Science, vol.91, pp.275–297, Jun. 2014.
Cherubini U, Mulinacci S and Gobbi F. Dynamic Copula Methods Infinance,New York:John Wiley & Sons, 2015.
Fantazzini D. ,“Dynamic Copula Modelling for Value at Risk,” Frontiers in Finance & Economics, vol.45, pp.45-49, Jun. 2015.
Patton A J. ,“Modeling Asymmetric Exchange Rate Dependence,” International economic review, vol. 34, pp.80 -85, Jul. 2014.
Nelsen R B. An Introduction to Copulas.Springer,2014.
Chu Wenkui and zhang Fengming,“Based on the military software security problems of the COTS study,”Journal of Systems Engineering and Electronics, vol. 3, pp.2166-2170, Aug. 2014.
Tu Gang, zhang bo and Yang Fumin,“The research of embedded operating system transplant technology,”Computer application research, vol. 56, pp.83-85, Dec. 2014.