Proceedings of the 2009 ACM Workshop on Cloud Computing Security 2009
DOI: 10.1145/1655008.1655016
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient access to outsourced data

Abstract: Providing secure and efficient access to large scale outsourced data is an important component of cloud computing. In this paper, we propose a mechanism to solve this problem in owner-write-users-read applications. We propose to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved. Through the adoption of key derivation methods, the owner needs to maintain only a few secrets. Analysis shows that the key derivation procedure using hash functions will i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
107
0
2

Year Published

2011
2011
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 183 publications
(112 citation statements)
references
References 22 publications
0
107
0
2
Order By: Relevance
“…However, user revocation is not supported. In [9], an owner's data is encrypted block-by-block, and a binary key tree is constructed over the block keys to reduce the number of keys given to each user. The SKC-based solutions have several key limitations.…”
Section: A Symmetric Key Cryptography (Skc) Based Solutionsmentioning
confidence: 99%
“…However, user revocation is not supported. In [9], an owner's data is encrypted block-by-block, and a binary key tree is constructed over the block keys to reduce the number of keys given to each user. The SKC-based solutions have several key limitations.…”
Section: A Symmetric Key Cryptography (Skc) Based Solutionsmentioning
confidence: 99%
“…Different techniques have been proposed to protect data outsourced to the cloud [3], [4], [5]. Among them, attribute-based access control has been given a lot of attention in recent years [6], [7], [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…With the tree-based ideas, some key management methods of access hierarchies for data outsourcing have been proposed [4,5,6,7,8]. These methods provide some useful solutions to minimize the number of cryptographic keys, which have to be managed and stored.…”
Section: Introductionmentioning
confidence: 99%
“…These methods provide some useful solutions to minimize the number of cryptographic keys, which have to be managed and stored. Aiming to provide secure and efficient access to outsourced data, Wang, Li et al [4] proposed a tree-based cryptographic key management scheme for data storages in the cloud. They referred the scenario to as "owner-write-users-read".…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation