p.2629
p.2634
p.2639
p.2644
p.2649
p.2655
p.2660
p.2663
p.2668
A Novel Data Access Scheme in Cloud Computing
Abstract:
Recently, Hota et al. present a Capability-based Cryptographic Data Access Control in Cloud Computing. This scheme implements data storage, user authorization, data access and integrity checking. However, we find two fatal attacks in the data exchange between CSP and User. These attacks makes a registered user can intercept another legal users file and decipher it. To avoid these attacks, we give an improvement to Hota et als scheme and can resist theses attacks. Meantime, to make Hotas scheme be applicable, we propose a novel data access protocol in cloud computing. Our scheme guarantees data confidentiality and secure data access between User and CSP. Security analysis shows that the scheme can resist various attacks.
Info:
Periodical:
Pages:
2649-2654
Citation:
Online since:
September 2013
Authors:
Price:
Сopyright:
© 2013 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: