The Cloud Access Control Based on Dynamic Feedback and Merkle Hash Tree

被引:2
|
作者
Yi, Xiushuang [1 ]
Wang, Weiqiang [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
关键词
access control; dynamic feedback; subjective trust; Merkle hash tree; cloud security;
D O I
10.1109/ISCID.2012.62
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For cloud environment is an open, dynamic environment, analysed the lack of based on the Merkle hash tree architecture, we propose a high efficiency, flexible and dynamic feedback, remote authentication mechanisms. This paper describes TPM_ Trust command enhanced the functionality of the existing TPM (trusted platform module), and analyze the discussion of the advantages of the new mechanism, and proposes a measuring method based on subjective trust.
引用
收藏
页码:217 / 221
页数:5
相关论文
共 50 条
  • [1] Merkle Hash Tree based Deduplication in Cloud Storage
    Li, Chaoling
    Chen, Yue
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6223 - 6227
  • [2] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    [J]. ELECTRONICS, 2023, 12 (03)
  • [3] Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree
    Zou, Jing
    Sun, Yunchuan
    Li, Shixian
    [J]. 2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 4 - 9
  • [4] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [5] Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
    Rao, Lu
    Zhang, Hua
    Tu, Tengfei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) : 451 - 463
  • [6] Certificate revocation system implementation based on the Merkle hash tree
    Jose L. Muñoz
    Jordi Forne
    Oscar Esparza
    Miguel Soriano
    [J]. International Journal of Information Security, 2004, 2 (2) : 110 - 124
  • [7] Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain
    He, Kai
    Huang, Chunxiao
    Shi, Jiaoli
    Hu, Xinrong
    Fan, Xiying
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [8] Homomorphic Authentication Based on Rank-Based Merkle Hash Tree
    Bai, Ping
    Zhang, Wei
    Wang, Xu An
    Liu, Yudong
    Yang, HaiBin
    Shan, Chun
    [J]. ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 841 - 848
  • [9] Range query integrity verification based on Merkle hash tree
    [J]. 1600, Southeast University (47):
  • [10] Discrepancy Detection in Merkle Tree-Based Hash Aggregation
    Osterland, Thomas
    Lemme, Gordon
    Rose, Thomas
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2021,