Anonymous chaotic cloud storage strategy based on Cp_abe and two-fork tree bias codes

Source: Internet
Author: User
Keywords Cloud storage cloud storage access control storage strategy anonymous storage
Tags access access control anonymous application application and development application software based basic

Anonymous chaotic cloud storage strategy based on Cp_abe and two-fork tree bias codes

Hebei University Yi Qingqing

With the application and development of cloud computing technology, cloud storage and its security, as its basic component, have become the focus of current research. Cloud storage is a new concept that extends and develops in the concept of cloud computing (cloud computing), which means that a large number of different types of storage devices in the network can be assembled together through application software through the functions of cluster application, grid technology or Distributed File system, A system that provides data storage and business access functions together externally. The emergence of cloud storage, so that users abandon the previous storage mode, without the purchase of large hardware cluster resources and complex management costs under the premise to meet the needs of data storage. However, under the current technical conditions, cloud storage still has security problems such as data security and confidentiality, which is a problem that must be solved in the development of cloud storage. According to the problem of data sharing and confidentiality in cloud storage, an anonymous cloud storage strategy based on attribute is proposed MACSS (ListBox encryption Anonymous Cloud Storage). The confidentiality and integrality of the data in the cloud storage platform are ensured by the mechanism of cipher access control and data anonymous scrambling storage. In real-world applications, users cannot fully trust the data security measures provided by cloud storage service providers, so MACSS uses modern cryptography and attribute-based key management to encrypt management and access control of user data. Establish a cloud access control model, using symmetric asymmetric encryption algorithm to encrypt plaintext data, using attribute based Cp_abe algorithm to establish access control system, to realize multi-user sharing of data, and to store data by means of binary tree coding and anonymous chaotic storage, and in untrusted cloud storage environment, Secure storage of data. Finally, the security analysis and comparative analysis of MACSS are carried out to illustrate the feasibility of the model.


Anonymous chaotic cloud storage strategy based on Cp_abe and two-fork tree bias codes

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.