A Novel Data Access Scheme in Cloud Computing

Article Preview

Abstract:

Recently, Hota et al. present a Capability-based Cryptographic Data Access Control in Cloud Computing. This scheme implements data storage, user authorization, data access and integrity checking. However, we find two fatal attacks in the data exchange between CSP and User. These attacks makes a registered user can intercept another legal users file and decipher it. To avoid these attacks, we give an improvement to Hota et als scheme and can resist theses attacks. Meantime, to make Hotas scheme be applicable, we propose a novel data access protocol in cloud computing. Our scheme guarantees data confidentiality and secure data access between User and CSP. Security analysis shows that the scheme can resist various attacks.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

2649-2654

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, A Data Outsourcing Architecture Combining Cryptography and Access Control, " in Proc. Of ACM Workshop on Computer Security Architecture (CSAW, 07), Nov 2007, USA.

DOI: 10.1145/1314466.1314477

Google Scholar

[2] Weichao Wang, Zhiwei Li, Rodney Owens, Bharat Bhargava. Secure and efficient access to outsourced data. In Proceedings of ACM Cloud Computing Security Workshop 2009 , pages55-65, (2009).

DOI: 10.1145/1655008.1655016

Google Scholar

[3] S. D. C. di Vimercati, S. Foresti, S. Jajodia,S. Paraboschi, and P. Samarati. A data outsourcing architecture combining cryptography and access control. In Proceedings of the ACM workshop on Computer security architecture, pages 63-69, (2007).

DOI: 10.1145/1314466.1314477

Google Scholar

[4] S. D. C. di Vimercati, S. Foresti, S. Jajodia,S. Paraboschi, and P. Samarati. Over-encryption: management of access control evolution on outsourced data. In Proceedings of the international conference on Very large databases, pages 123-134, (2007).

DOI: 10.1007/11552338_2

Google Scholar

[5] Seny Kamara and Kristin Lauter. Cryptographic cloud storage http: /research. microsoft. com/, (2010).

Google Scholar

[6] Z. Dai, and Q. Zhou, A PKI-based Mechanism for Secure and Efficient Access to Outsourced Data, in Proc. of International Conference on Networking and Digital Society, 2010, pp.640-643.

DOI: 10.1109/icnds.2010.5479290

Google Scholar

[7] S. Sanka, C. Hota, and M. Rajarajan, Secure data access in cloud computing, in IEEE 4th International conference on Internet Multimedia systems architectures and applications, IMSAA 2010 Bangalore, India, 2010, pp.1-6.

DOI: 10.1109/imsaa.2010.5729397

Google Scholar

[8] Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based Cryptographic Data Access Control in Cloud Computing. Int. J. Advanced Networking and Applications 03, 1152–1161 (2011).

Google Scholar