• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Ning, Jianting (Ning, Jianting.) [1] | Huang, Xinyi (Huang, Xinyi.) [2] | Susilo, Willy (Susilo, Willy.) [3] | Liang, Kaitai (Liang, Kaitai.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Zhang, Yinghui (Zhang, Yinghui.) [6]

Indexed by:

EI

Abstract:

Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service user privacy. To protect sensitive data from being compromised, the most widely used method is encryption. However, simply encrypting data (e.g., via AES) cannot fully address the practical need of data management. Besides, an effective access control over download request also needs to be considered so that Economic Denial of Sustainability (EDoS) attacks cannot be launched to hinder users from enjoying service. In this article, we consider the dual access control, in the context of cloud-based storage, in the sense that we design a control mechanism over both data access and download request without loss of security and efficiency. Two dual access control systems are designed in this article, where each of them is for a distinct designed setting. The security and experimental analysis for the systems are also presented. © 2004-2012 IEEE.

Keyword:

Access control Cloud security Costs Cryptography Digital storage Information management

Community:

  • [ 1 ] [Ning, Jianting]Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian; 350007, China
  • [ 2 ] [Ning, Jianting]School of Information Systems, Singapore Management University, Singapore; 188065, Singapore
  • [ 3 ] [Huang, Xinyi]Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian; 350007, China
  • [ 4 ] [Susilo, Willy]Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong; NSW; 2522, Australia
  • [ 5 ] [Liang, Kaitai]Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft; 2628 CD, Netherlands
  • [ 6 ] [Liu, Ximeng]College of Mathematics and Computer Science, Fuzhou University, Fujian, Fuzhou; 350108, China
  • [ 7 ] [Zhang, Yinghui]School of Cyberspace Security, Xi'An University of Posts and Telecommunications, Xi'an; 710061, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2022

Issue: 2

Volume: 19

Page: 1036-1048

7 . 3

JCR@2022

7 . 0 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 44

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Affiliated Colleges:

Online/Total:103/10044919
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1