会议专题

A Novel Data Access Scheme in Cloud Computing

  Recently,Hota et al.present a Capability-based Cryptographic Data Access Control in Cloud Computing.This scheme implements data storage,user authorization,data access and integrity checking.However,we find two fatal attacks in the data exchange between CSP and User.These attacks makes a registered user can intercept another legal users file and decipher it.To avoid these attacks,we give an improvement to Hota et als scheme and can resist theses attacks.Meantime,to make Hotas scheme be applicable,we propose a novel data aecess protocol in cloud computing.Our scheme guarantees data confidentiality and seeurc data access between User and CSP.Security analysis shows that the scheme can resist various attacks.

Cloud Computing Access control Diffie-Hellman Exchange

Xiaowei Gao Zemin Jiang Rui Jiang

School of Information Science and Engineering Southeast University Nanjing, China IOT Research Institute China Unicom Wuxi, China

国际会议

2012 2nd International Conference on Computer and Information Applications(ICCIA2012)(2012第二届计算机和信息应用国际会议)

太原

英文

124-127

2012-12-08(万方平台首次上网日期,不代表论文的发表时间)