首页 | 本学科首页   官方微博 | 高级检索  
     


Key management for outsourced data security
Authors:Bei Pei  Changsong Chen  Changsheng Wan
Affiliation:1. The Third Research Institute of Ministry of Public Security, Shanghai, 201204, China
2. School of Information Science and Engineering, Southeast University, Nanjing, 210096, Jiangsu, China
Abstract:This paper analyzes the efficiency and security of bilinear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model including four entities is designed to provide both integrity and confidentiality protection. The proposed scheme can be proved to achieve the security goals that no cheating cloud server can pass the auditing without storing users’ data intact. The efficiency of the proposal is evaluated by analyzing the fulfillment of the design goals, including the computation cost, communication cost and storage cost of our scheme. This light weight publicly auditable Proof-of-storage scheme achieves security goals perfectly, and has an excellent efficiency performance superior to the current bilinear-map-based publicly auditable Proof-of-storage scheme.
Keywords:cloud computing  malicious cloud server  key management
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号