Research on data access control method in cloud computing
Source: Internet
Author: User
KeywordsData access cloud computing
Research on data access control method in cloud computing
Nanjing University of Posts and telecommunications
This paper presents an attribute-based access control model (DACC) for cloud computing environments using Cp-abe encryption algorithm. The core idea is to use the AES symmetric encryption algorithm and the Cp-abe encryption algorithm, respectively to encrypt the data and symmetric key, and the user of the attribute matching to decrypt the key cipher text and the data cipher in sequence. In order to reduce the cost of storing and updating keys, the Key Distribution center KDC is introduced to manage attributes and keys. Cloud computing service providers, because they do not have a key, can only store data and not decrypt data, thus ensuring the security of data stored in the cloud. After the detailed scheme is presented, the security and calculation are analyzed, and the simulation of the algorithm is carried out under the Ubuntu system, which proves the feasibility of this scheme.
Research on data access control method in cloud computing
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.