Title :
Based on the Attribute Encrypted Cloud Storage Scheme
Author_Institution :
Sch. of Comput. & Commun., Lanzhou Univ. of Technol., Lanzhou, China
Abstract :
With the wide application of cloud storage service, its security problem is apparent. The conspiracy resistance is a major problem. Aiming at this issue, we proposed a limited length of the ciphertext hidden control policies, which enhance the safety and at the same time improve efficiency. We establish cloud access control model, ABE encryption mode structure access control policies, and give the user revocation and access policies update method. Safety analysis shows that the scheme can resist conspiracy attack between users.
Keywords :
authorisation; cloud computing; cryptography; ABE encryption mode structure access control policies; attribute encrypted cloud storage scheme; ciphertext hidden control policies; cloud access control model; cloud storage service; security problem; Authorization; Cloud computing; Encryption; Public key; access control; ciphertext strategy; cloud storage; conspiracy resistance; formatting;
Conference_Titel :
Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on
Conference_Location :
Shiyang
DOI :
10.1109/ICCIS.2013.363