A Novel Data Access Scheme in Cloud Computing
Recently,Hota et al.present a Capability-based Cryptographic Data Access Control in Cloud Computing.This scheme implements data storage,user authorization,data access and integrity checking.However,we find two fatal attacks in the data exchange between CSP and User.These attacks makes a registered user can intercept another legal users file and decipher it.To avoid these attacks,we give an improvement to Hota et als scheme and can resist theses attacks.Meantime,to make Hotas scheme be applicable,we propose a novel data aecess protocol in cloud computing.Our scheme guarantees data confidentiality and seeurc data access between User and CSP.Security analysis shows that the scheme can resist various attacks.
Cloud Computing Access control Diffie-Hellman Exchange
Xiaowei Gao Zemin Jiang Rui Jiang
School of Information Science and Engineering Southeast University Nanjing, China IOT Research Institute China Unicom Wuxi, China
国际会议
太原
英文
124-127
2012-12-08(万方平台首次上网日期,不代表论文的发表时间)