Key Management for Outsourced Data Security

被引:0
作者
PEI Bei [1 ]
CHEN Changsong [1 ]
WAN Changsheng [2 ]
机构
[1] The Third Research Institute of Ministry of Public Security
[2] School of Information Science and Engineering, Southeast University
关键词
cloud computing; malicious cloud server; key management;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
This paper analyzes the efficiency and security of bilinear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing,which is much more efficient.In this scheme,a trust model including four entities is designed to provide both integrity and confidentiality protection.The proposed scheme can be proved to achieve the security goals that no cheating cloud server can pass the auditing without storing users’data intact.The efficiency of the proposal is evaluated by analyzing the fulfillment of the design goals,including the computation cost,communication cost and storage cost of our scheme.This light weight publicly auditable Proof-of-storage scheme achieves security goals perfectly,and has an excellent efficiency performance superior to the current bilinear-map-based publicly auditable Proof-of-storage scheme.
引用
收藏
页码:449 / 454
页数:6
相关论文
共 1 条
[1]  
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing .2 Cong Wang,Qian Wang,Kui Ren,Wenjing Lou. INFOCOM 2010 Proceedings IEEE . 2010