Secure access scheme for outsourced data based on Trusted Platform Module
Source: Internet
Author: User
KeywordsData security security
Secure access scheme for outsourced data based on Trusted Platform Module
Shang Donglai Peng Yang Yuli
In order to improve the security of packet data access mechanism in cloud computing, this paper improves a tree based key management scheme, which is suitable for data owner-write-user-read/write applications. For malicious users in the scene, the new mechanism introduces the Trusted Platform Module (Trusted Platform module, TPM), which mainly solves the problem that the original scheme is caused by the session key, data encryption/decryption key and User privilege change during the data access process. In addition, it also considers how to ensure the authenticity of the user and the security of the user computing environment. At the same time, the replay attack and type defect attack in the original scheme are found, and the correction scheme is proposed. Finally, the paper uses the π calculus modeling and verifies the security of the new mechanism using the Verification tool Proverif. The results show that the new mechanism enhances the practicability and security of the original scheme.
Secure access scheme for outsourced data based on Trusted Platform Module
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.