2013
DOI: 10.1002/sec.850
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight key management on sensitive data in the cloud

Abstract: As cloud servers may not be trusted, sensitive data have to be transmitted and stored in an encrypted form. Major challenges for users are from the management (storage, update, protection, backup, and recoverability) of keys that can help users to decrypt authorized data available on the servers. In this paper, we propose a versatile approach for extremely lightweight key management, which is one of the most basic security tasks in cloud systems. In the multiple data owners scenario, each user only needs to ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…We conduct experiments to compare our work with Data Access Control for Multi‐Authority Cloud Storage (DAC‐MACS) and Encryption based on the Bridge Key (EBK) . DAC‐MACS and EBK were proposed in resent years. There are some similarities between DAC‐MACS, EBK, and IBKM: (i) DAC‐MACS and IBKM are CP‐ABE schemes.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We conduct experiments to compare our work with Data Access Control for Multi‐Authority Cloud Storage (DAC‐MACS) and Encryption based on the Bridge Key (EBK) . DAC‐MACS and EBK were proposed in resent years. There are some similarities between DAC‐MACS, EBK, and IBKM: (i) DAC‐MACS and IBKM are CP‐ABE schemes.…”
Section: Methodsmentioning
confidence: 99%
“…However, methods in did not consider the scenario of multiple data providers. Moving a step forward, Cui et al , extended the "key derivation" method to support the scenario of multiple data providers by introducing the concept of “bridge key”. A legal user could derive decryption keys by his/her bridge keys.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the outsourcing of cloud computing, we have to consider the problem of efficiency and cost, and asymmetric encryption is less efficient than symmetric encryption . Therefore, we adopt the symmetric encryption scheme.…”
Section: Preliminariesmentioning
confidence: 99%
“…Effective processing and retrieval of the encrypted data can be achieved and data transmission security can be improved without requiring much storage. Cui et al [33] proposed a lightweight key management technique for ensuring high data security in the cloud system. All authorized data can be decrypted using a single key and a set of public information stored on the server.…”
mentioning
confidence: 99%