Please use this identifier to cite or link to this item:
A Data Sharing Access Scheme with Limited Number of Times in Cloud Storage Servers
Data Privacy Protect
|引用:|| D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing, “International Conference on Computer Science and Electronics Engineering, IEEE, vol. 1, pp. 647–651. 2012.  K.Y. Huang, G. H. Luo, and S. M. Yuan, “SSTreasury+: A Secure and Elastic Cloud Data Encryption System,” Genetic and Evolutionary Computing (ICGEC), IEEE, pp. 25-28, Aug. 2012.  B. Yasmina and R. Rahal, “Secure data storage in the cloud with homomorphic encryption,” Cloud Computing Technologies and Applications (CloudTech), IEEE, pp. 24-26, May. 2016.  W. Luo and G. Bai, “Ensuring the data integrity in cloud data storage,” Cloud Computing and Intelligence Systems (CCIS), IEEE, pp. 15-17, Sep. 2011.  R. Sravan Kumar and A. Saxena, “Data Integrity Proofs in Cloud Storage,” Communication Systems and Networks (COMSNETS), IEEE, pp. 4-8, Jan. 2011.  X. F. Liu, Y. Q. Zhang, B. Y. Wang, and J. B. Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions on Parallel and Distributed Systems, pp. 1182-1191, Dec. 2012.  W. Li, K. P. Xue, and Y. J. Xue, “TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, pp. 1484-1496, Jan. 2015.  D. X. Liu, H. W. Li, Y. Yi, and H. M. Yang, “Achieving Multi-Authority Access Control with Efficient Attribute Revocation in Smart Grid,” Communications (ICC), IEEE, pp.10-14, Jun. 2014.  N. Vannchig, W. Chen, and Z. G. Qin, “Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System,” Advanced Cloud and Big Data (CBD), IEEE, pp. 13-16, Aug. 2016.  G. Imad El, B. Rachid, and M. Fatiha, “FP2E: Flexible, effective and privacy preserving cloud data sharing scheme,” Cloud Computing Technologies and Applications, IEEE, pp. 24-26, May. 2016.  N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, vol. 48, pp. 203-209, 1987.  V. Miller, “Use of elliptic curves in cryptography,” Advances in cryptology---CRYPTO 85, Springer Lecture Notes in Computer Science, vol. 218, 1985.  D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” Proc. 21st Annu. Int. Cryptology Conf. Adv. Cryptology, pp. 213–229, 2001.  D. Johnson and A. Menezes, “The elliptic curve digital signature algorithm (ECDSA)”, Technical report CORR-34, Dept. of C&O, University of Waterloo, 1999.  L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM, vol. 24, pp. 770-772, 1981.  S. Kamara and K. Lauter, “Cryptographic cloud storage,” Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization 2010, January 2010.  J. Yuan and S. Yu, “Public integrity auditing for dynamic data sharing with multi-user modification,” IEEE Trans. Inf. Forensics Secure, pp. 1717–1726, 2015  Y. J. Yang and Y. C. Zhang, “A generic scheme for secure data sharing in Cloud,” 40th International Conference on Parallel Processing Workshops (ICPPW), pp. 145–153, 2011.  S. K. Yang, “A Lightweight Anonymous Authentication Scheme,” master’s thesis of NCHU, 2016.  C. K. Chu, S. M. Chow, and W. G. Tzeng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, pp. 468-477, April. 2013.  V. Biksham and D. Vasumathi, “Query based computations on encrypted data through homomorphic encryption in cloud computing security,” Electrical, Electronics, and Optimization Techniques (ICEEOT), IEEE, pp. 3-5, Mar. 2016.  G. J. Wang, Q. Liu, and J. Wu, “Achieving fine-grained access control for secure data sharing on cloud servers,” Concurrency and Computation: Practice and Experience, Feb. 2011.  H. Wang, “Privacy-Preserving Data Sharing in Cloud Computing,” Journal of Computer Science and Technology, vol. 25, pp. 401–414, 2010.  K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing,” Proc. 19th Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 8712, pp. 257-272, Sep. 2014.|
With the advent of big data generation, cloud data storage and computing have become more and more popular. Users using cloud storage to do data sharing are increasing. However, convenient life also brings in some security challenges. Someone with evil intention might get some users’ information via uploaded files. Hence, the security of data sharing in cloud storage has gained attention recently. In this thesis, we survey the related issue of data sharing within a public cloud and propose a filing the purchase of the request in need, data query and authentication scheme. We provide an authenticated access with a limited number of times to the users. Our scheme allows users to share the confidential files in public cloud storage servers.
|Appears in Collections:||資訊科學與工程學系所|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.