Access Control Management of Cloud Storage System Based on NSSC in Mobile Network

Article Preview

Abstract:

This paper focuses on the access control management of cloud storage system based on NSSC in mobile network. NSSC (Network Security Service Center) is a new key service mechanism, which is responsible for network security service in mobile network management. Through experimental data comparative analysis, it proved high effectiveness and practicality of the NSSC in cloud storage system for access control management in mobile network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

416-423

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Xu. Gaochao. Distributed Computing Systems, Beijing: High Education Press., pp. 124C141, January (2004).

Google Scholar

[2] Lin Zi, Shi Wen Xiao, Wang Li, A study and analysis on a high intensity public data encryption algorithm, CA: Proceedings of the 3th World Congress on Intelligent Control and Automation, (2000).

DOI: 10.1109/wcica.2000.862493

Google Scholar

[3] Elbirt A.J., Yip W., Chetwynd B., Paar C.: An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists, Third Advanced Encryption Standard (AES3) Candidate Conference, New York, (2000).

DOI: 10.1109/92.931230

Google Scholar

[4] Gaj K. and Chodowiec P.: Comparison of the hardware performance of the AES candidates using reconfigurable hardware, Third Advanced Encryption Standard (AES3) Candidate Conference, New York, (2000).

Google Scholar

[5] Liao Hsien-Chou, Chao Yun-Hsiang, A new data encryption algorithm based on the location of mobile users, JA: Information Technology Journal, vol. 7, pp.63-69, (2008).

DOI: 10.3923/itj.2008.63.69

Google Scholar

[6] Nadeem Aamer, Javed M. Younus, A performance comparison of data encryption algorithms, CA: 1st International Conference on Information and Communication Technology, vol. 2005, pp.84-89, (2005).

DOI: 10.1109/icict.2005.1598556

Google Scholar

[7] Yee Wei Law, Jeroen Doumen, Pieter Hartel, Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [J]. ACM Transactions on Sensor Networks, 8(2): 65-93, (2006).

DOI: 10.1145/1138127.1138130

Google Scholar