咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Fine-grained and heterogeneous... 收藏

Fine-grained and heterogeneous proxy re-encryption for secure cloud storage

Fine-grained and heterogeneous proxy re-encryption for secure cloud storage

作     者:Peng Xu Hongwu Chen Deqing Zou Hai Jin 

作者机构:Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology 

出 版 物:《Chinese Science Bulletin》 (科学通报(英文版))

年 卷 期:2014年第59卷第32期

页      面:4201-4209页

核心收录:

学科分类:08[工学] 0839[工学-网络空间安全] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:partly supported by the National Natural Science Foundation of China(61100222) partly supported by the National Basic Research Program of China(2014CB340600) 

主  题:安全问题 数据存储 加密算法 细粒度 异构 代理 计算模式 数据共享 

摘      要:Cloud is an emerging computing *** has drawn extensive attention from both academia and *** its security issues have been considered as a critical obstacle in its rapid *** data owners store their data as plaintext in cloud,they lose the security of their cloud data due to the arbitrary accessibility,specially accessed by the un-trusted *** order to protect the confidentiality of data owners’cloud data,a promising idea is to encrypt data by data owners before storing them in ***,the straightforward employment of the traditional encryption algorithms can not solve the problem well,since it is hard for data owners to manage their private keys,if they want to securely share their cloud data with others in a fine-grained *** this paper,we propose a fine-grained and heterogeneous proxy re-encryption(FHPRE)system to protect the confidentiality of data owners’cloud *** applying the FH-PRE system in cloud,data owners’cloud data can be securely stored in cloud and shared in a fine-grained ***,the heterogeneity support makes our FH-PRE system more efficient than the previous ***,it provides the secure data sharing between two heterogeneous cloud systems,which are equipped with different cryptographic primitives.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分