A data encryption scheme for cloud storage security

被引:0
|
作者
Wu, Wei-nong [1 ]
Zheng, Yuan-bing [1 ]
Wu, Bin [2 ]
Wu, Lie [2 ]
机构
[1] State Grid Chongqing Informat & Telecommun C, Chongqing 400014, Peoples R China
[2] State Grid Chongqing Elect Power Co, Chongqing 400014, Peoples R China
关键词
Access control structure tree; Cloud storage; Data encryption; Dynamic attribute encryption;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud storage has seen an increasing trend with the development of social networks, but its security remains an important problem to be solved. In this paper, a new encryption scheme based on dynamic attributes is proposed to solve the problem in the attribute based encryption scheme. In the scheme, a data encryption access control strategy is generated by the sender attributes according to certain logical relationships. Additionally, an access control tree structure is used to describe the access control policy. Only when the attribute set of receiver meets the access policy can the data be decrypted; to achieve this, the access control tree structure is dynamically adjusted simultaneously with changes in the attribute set of sender.
引用
收藏
页码:666 / 674
页数:9
相关论文
共 50 条
  • [1] A cross encryption scheme for data security storage in cloud computing environment
    Kang, Haiyan
    Deng, Jie
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) : 1 - 10
  • [2] Enhancement in Homomorphic Encryption Scheme for Cloud Data Security
    Kaur, Samjot
    Wasson, Vikas
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 54 - 59
  • [3] SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
    Li, Jian
    Chen, Sicong
    Song, Danjie
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 224 - 227
  • [4] Applying Encryption Algorithm for Data Security in Cloud Storage
    Kartit, Zaid
    Azougaghe, Ali
    Kamal Idrissi, H.
    El Marraki, M.
    Hedabou, M.
    Belkasmi, M.
    Kartit, A.
    [J]. ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 141 - 154
  • [5] A scheme to ensure data security of cloud storage
    Wang, Huifeng
    Li, Zhanhuai
    Zhao, Xiaonan
    Qi, Chanying
    He, Qinlu
    Sun, Jian
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 79 - 82
  • [6] Cloud Storage Third-party Data Security Scheme Based on Fully Homomorphic Encryption
    Chen, Junjian
    [J]. 2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 155 - 159
  • [7] Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage
    Liu, Zhenhua
    Gong, Jingwan
    Ma, Yuanju
    Niu, Yaxin
    Wang, Baocang
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 324 - 345
  • [8] Applying encryption algorithm to enhance data security in cloud storage
    Laboratory of Research in Informatics and Telecommunication , University of Mohammed V,Faculty of Science, Rabat, Morocco
    [J]. Eng. Lett., 4 (277-282):
  • [9] Applying Encryption Algorithm to Enhance Data Security in Cloud Storage
    Kartit, Zaid
    El Marraki, Mohamed
    [J]. ENGINEERING LETTERS, 2015, 23 (04) : 277 - 282
  • [10] A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloud
    Kangavalli, R.
    Vagdevi, S.
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1062 - 1066