多权威云存储的图像管理和数据访问控制,使用较少的证书加密

V. Gutte, Amol N. Jadhav, Pramod Mundhe
{"title":"多权威云存储的图像管理和数据访问控制,使用较少的证书加密","authors":"V. Gutte, Amol N. Jadhav, Pramod Mundhe","doi":"10.1109/ICAECCT.2016.7942557","DOIUrl":null,"url":null,"abstract":"Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"136 1","pages":"64-67"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Image management and data access control for Multi-authority cloud storage with use of certificate less encryption\",\"authors\":\"V. Gutte, Amol N. Jadhav, Pramod Mundhe\",\"doi\":\"10.1109/ICAECCT.2016.7942557\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.\",\"PeriodicalId\":6629,\"journal\":{\"name\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"volume\":\"136 1\",\"pages\":\"64-67\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECCT.2016.7942557\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCT.2016.7942557","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

云计算技术越来越受到重视,其安全性受到高度关注。在私人、公共或政府组织的领域内。它展示了透明度的新方面。云计算提供透明度的主要问题是,分布式方案中不同级别的资源共享具有严重的影响。当涉及敏感或与隐私相关的数据时,最具挑战性的任务是安全。在云计算中,数据访问控制是保证数据安全的有效途径。不安全的云服务器或不受信任的云服务器的问题,对各种供应商的数据访问控制成为当今云存储系统中最具挑战性和最不安全的问题。但是在用户的数据或属性被撤销后,我们必须通过重新加密的过程来显示更多的安全性。在提出的方法中,我们通过依赖公共云服务器使用基于证书的加密方案。我们将其作为底层技术应用于数据用户的设计和过程中的数据访问控制方案。我们了解到,我们的无证书加密方法不仅可以有效地提供前向安全,而且可以更有效地提供后向安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Image management and data access control for Multi-authority cloud storage with use of certificate less encryption
Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Keynote speakers Emotweet: Sentiment Analysis tool for twitter Design of faster & power efficient sense amplifier using VLSI technology A comparative study on distance measuring approches for permutation representations An embedded system of dedicated and real-time fire detector and locator technology as an interactive response mechanism in fire occurrences
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1